Sciweavers

687 search results - page 86 / 138
» A Self-Policing Policy Language
Sort
View
93
Voted
CIKM
2000
Springer
15 years 6 months ago
A Framework for Modeling Buffer Replacement Strategies
An e ective bu er management system is crucial for any database management system. While much work has been expended to provide extensible data types,extensible query languages an...
Stéphane Bressan, Chong Leng Goh, Beng Chin...
IEEECIT
2010
IEEE
15 years 11 days ago
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML
—In this paper we describe extensions to the access control industry standards XACML and SAML to enable privacy-preserving and credential-based access control. Rather than assumi...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
141
Voted
JLP
2011
94views more  JLP 2011»
14 years 8 months ago
Permission to speak: A logic for access control and conformance
Formal languages for policy have been developed for access control and conformance checking. In this paper, we describe a formalism that combines features that have been developed...
Nikhil Dinesh, Aravind K. Joshi, Insup Lee, Oleg S...
124
Voted
ESOP
2010
Springer
15 years 5 months ago
A Semantic Framework for Declassification and Endorsement
Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Se...
Aslan Askarov, Andrew Myers
CCS
2008
ACM
15 years 3 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...