Sciweavers

SP
2002
IEEE
103views Security Privacy» more  SP 2002»
13 years 3 months ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash
IM
2007
13 years 5 months ago
Issues in Designing a Policy Language for Distributed Management of IT Infrastructures
— The objectives of this paper are twofold. First, we introduce a novel policy language, called CIM-SPL (Simple Policy Language for CIM) that complies with the CIM (Common Inform...
Dakshi Agrawal, Seraphin B. Calo, Kang-Won Lee, Jo...
CCS
2006
ACM
13 years 8 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
DSOM
2004
Springer
13 years 9 months ago
Defining Reusable Business-Level QoS Policies for DiffServ
This paper proposes a PBNM (Policy Based Network Management) framework for automating the process of generating and distributing DiffServ configuration to network devices. The fram...
André Beller, Edgard Jamhour, Marcelo Eduar...
ITCC
2005
IEEE
13 years 10 months ago
Formalisation and implementation of Access control models
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Mathieu Jaume, Charles Morisset
MODELS
2007
Springer
13 years 10 months ago
Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet
Abstract. This contribution gives an overview of various access control strategies in use in contemporary healthcare scenarios and shows how a broad variety of respective policies ...
Michael Hafner, Mukhtiar Memon, Muhammad Alam