Sciweavers

179 search results - page 2 / 36
» Security Policy Enforcement Through Refinement Process
Sort
View
VLDB
2006
ACM
172views Database» more  VLDB 2006»
14 years 5 months ago
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Fabio Massacci, John Mylopoulos, Nicola Zannone
WETICE
2005
IEEE
13 years 10 months ago
Trust Infrastructure for Policy based Messaging In Open Environments
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforced at recipient systems to provide security features. PBM promotes a distributed...
Gansen Zhao, David W. Chadwick
SACMAT
2005
ACM
13 years 10 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
IJNSEC
2007
139views more  IJNSEC 2007»
13 years 4 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
JNSM
2007
65views more  JNSM 2007»
13 years 4 months ago
Implementation of a Formal Security Policy Refinement Process in WBEM Architecture
Romain Laborde, Michel Kamel, François Barr...