Sciweavers

38 search results - page 1 / 8
» Security policy compliance with violation management
Sort
View
CCS
2007
ACM
13 years 11 months ago
Security policy compliance with violation management
Julien Brunel, Frédéric Cuppens, Nor...
CCS
2011
ACM
12 years 5 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
FC
1998
Springer
96views Cryptology» more  FC 1998»
13 years 9 months ago
Compliance Checking in the PolicyMaker Trust Management System
Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that rec...
Matt Blaze, Joan Feigenbaum, Martin Strauss
IHI
2012
285views Healthcare» more  IHI 2012»
12 years 26 days ago
Towards HIPAA-compliant healthcare systems
In healthcare domain, there is a gap between healthcare systems and government regulations such as the Health Insurance Portability and Accountability Act (HIPAA). The violations ...
Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu
CCS
2008
ACM
13 years 7 months ago
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Adam J. Lee, Marianne Winslett