Sciweavers

948 search results - page 31 / 190
» Analysis of SITA policies
Sort
View
SODA
2001
ACM
115views Algorithms» more  SODA 2001»
14 years 11 months ago
Loss-bounded analysis for differentiated services
We consider a network providing Differentiated Services (DiffServ) which allow network service providers to offer different levels of Quality of Service (QoS) to different traffic...
Alexander Kesselman, Yishay Mansour
SEMWEB
2005
Springer
15 years 3 months ago
Representing Web Service Policies in OWL-DL
Abstract. Recently, there have been a number of proposals for languages for expressing web service constraints and capabilities, with WSPolicy and WSPL leading the way. The propose...
Vladimir Kolovski, Bijan Parsia, Yarden Katz, Jame...
CSFW
2009
IEEE
15 years 4 months ago
Tight Enforcement of Information-Release Policies for Dynamic Languages
This paper studies the problem of securing information release in dynamic languages. We propose (i) an intuitive framework for information-release policies expressing both what ca...
Aslan Askarov, Andrei Sabelfeld
ACSAC
1999
IEEE
15 years 2 months ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
CEAS
2006
Springer
15 years 1 months ago
Using E-Mail Social Network Analysis for Detecting Unauthorized Accounts
In this paper we detail the use of e-mail social network analysis for the detection of security policy violations on computer systems. We begin by formalizing basic policies that ...
Adam J. O'Donnell, Walter C. Mankowski, Jeff Abrah...