Sciweavers

518 search results - page 21 / 104
» Abstract Interpretation-Based Protection
Sort
View
ECAI
2008
Springer
15 years 3 months ago
Addressing Temporal Aspects of Privacy-Related Norms
Abstract. Agents interacting in open environments such as Internet are often in charge of personal information. In order to protect the privacy of human users, such agents have to ...
Guillaume Piolle, Yves Demazeau
CORR
2004
Springer
120views Education» more  CORR 2004»
15 years 1 months ago
Validating a Web Service Security Abstraction by Typing
Abstraction by Typing Andrew D. Gordon Microsoft Research Riccardo Pucella Cornell University An XML web service is, to a first approximation, an RPC service in which requests and...
Andrew D. Gordon, Riccardo Pucella
CCS
2008
ACM
15 years 3 months ago
Principled reasoning and practical applications of alert fusion in intrusion detection systems
It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
Guofei Gu, Alvaro A. Cárdenas, Wenke Lee
CCS
2011
ACM
14 years 1 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
FORTE
2004
15 years 3 months ago
A Logical Account of NGSCB
Abstract. As its name indicates, NGSCB aims to be the "Next-Generation Secure Computing Base". As envisioned in the context of Trusted Computing initiatives, NGSCB provid...
Martín Abadi, Ted Wobber