Sciweavers

948 search results - page 28 / 190
» Analysis of SITA policies
Sort
View
ICTCS
2005
Springer
15 years 3 months ago
Checking Risky Events Is Enough for Local Policies
Abstract. An extension of the λ-calculus is proposed to study historybased access control. It allows for parametrized security policies with a possibly nested, local scope. To gov...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
WWW
2006
ACM
15 years 10 months ago
Why is connectivity in developing regions expensive: policy challenges more than technical limitations?
I present analysis examining some of the causes of poor connectivity in developing countries. Based on a technoeconomic analysis and design, I show that technical limitations per ...
Rahul Tongia
IEEEARES
2008
IEEE
15 years 4 months ago
Static Validation of Licence Conformance Policies
Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...
René Rydhof Hansen, Flemming Nielson, Hanne...
WWW
2008
ACM
15 years 10 months ago
A new aggregation policy for RSS services
RSS is the XML-based format for syndication of Web contents, and users aggregate RSS feeds with RSS feed aggregators. There are RSS aggregation policies that help aggregate RSS fe...
Young Geun Han, Sang Ho Lee, Jae Hwi Kim, Yanggon ...
ESORICS
2004
Springer
15 years 3 months ago
An Algebra for Composing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with d...
Michael Backes, Markus Dürmuth, Rainer Steinw...