Sciweavers

128 search results - page 1 / 26
» Transparent Network Security Policy Enforcement
Sort
View
USENIX
2000
13 years 6 months ago
Transparent Network Security Policy Enforcement
Angelos D. Keromytis, Jason L. Wright
USS
2010
13 years 3 months ago
AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements
Web publishers frequently integrate third-party advertisements into web pages that also contain sensitive publisher data and end-user personal data. This practice exposes sensitiv...
Mike Ter Louw, Karthik Thotta Ganesh, V. N. Venkat...
ACSAC
2001
IEEE
13 years 9 months ago
Security Policy Enforcement at the File System Level in the Windows NT Operating System Family
This paper describes the implementation of an enforcement module for file system security implemented as part of a security architecture for distributed systems which enforces a c...
Stephen D. Wolthusen
SACMAT
2005
ACM
13 years 10 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
ECOOP
2009
Springer
14 years 5 months ago
Security Monitor Inlining for Multithreaded Java
Abstract. Program monitoring is a well-established and efficient approach to security policy enforcement. An implementation of program monitoring that is particularly appealing for...
Mads Dam, Bart Jacobs 0002, Andreas Lundblad, Fran...