Sciweavers

329 search results - page 30 / 66
» A Theory of Secure Control Flow
Sort
View
CCS
2006
ACM
15 years 1 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
DAGSTUHL
2001
14 years 11 months ago
A Language-Based Approach to Security
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
IHI
2010
160views Healthcare» more  IHI 2010»
14 years 4 months ago
Securing the e-health cloud
Modern information technology is increasingly used in healthcare with the goal to improve and enhance medical services and to reduce costs. In this context, the outsourcing of com...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
15 years 3 months ago
Using IDEF0/Petri Net for Ontology-Based Task Knowledge Analysis: The Case of Emergency Response for Debris-Flow
In terms of the progress of the industry, the velocity and dynamic nature of the global environment, has caused serious damage and diminished our earth’s resources. A lot of eff...
Wen-Yu Liu, Kwoting Fang
SOUPS
2010
ACM
14 years 9 months ago
Improving users' security choices on home wireless networks
Home networks are common but notoriously difficult to setup and maintain. The difficulty users experience in setting up and maintaining their home network is problematic because o...
Justin T. Ho, David Dearman, Khai N. Truong