Sciweavers

25 search results - page 4 / 5
» Pastures: Towards Usable Security Policy Engineering
Sort
View
SOUPS
2006
ACM
13 years 11 months ago
Power strips, prophylactics, and privacy, oh my!
While Internet users claim to be concerned about online privacy, their behavior rarely reflects those concerns. In this paper we investigate whether the availability of compariso...
Julia Gideon, Lorrie Faith Cranor, Serge Egelman, ...
PLDI
2012
ACM
11 years 8 months ago
RockSalt: better, faster, stronger SFI for the x86
Software-based fault isolation (SFI), as used in Google’s Native Client (NaCl), relies upon a conceptually simple machine-code analysis to enforce a security policy. But for com...
Greg Morrisett, Gang Tan, Joseph Tassarotti, Jean-...
AOSD
2004
ACM
13 years 11 months ago
What are the key issues for commercial AOP use: how does AspectWerkz address them?
AspectWerkz is a framework targeted towards dynamic aspectoriented programming (AOP) in commercial applications. Based on our experience designing and supporting AspectWerkz, we h...
Jonas Bonér
COMPSAC
2009
IEEE
14 years 15 days ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
FASE
2008
Springer
13 years 7 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu