Sciweavers

948 search results - page 68 / 190
» Analysis of SITA policies
Sort
View
SCS
2004
15 years 3 months ago
Eliciting Measures of Value for Health and Safety
Many transport policies and innovations are liable to have implications for human health and safety. How should such implications be weighed against the other costs and benefits? ...
Michael Jones-Lee, Graham Loomes
IJNSEC
2007
142views more  IJNSEC 2007»
15 years 1 months ago
Java Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Inform...
Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Ma...
COLCOM
2007
IEEE
15 years 8 months ago
Secure peer-to-peer networks for trusted collaboration
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Kevin W. Hamlen, Bhavani M. Thuraisingham
CSFW
2007
IEEE
15 years 8 months ago
Do As I SaY! Programmatic Access Control with Explicit Identities
We address the programmatic realization of the access control model of security in distributed systems. Our aim is e the gap between abstract/declarative policies and their concre...
Andrew Cirillo, Radha Jagadeesan, Corin Pitcher, J...
CONCUR
2001
Springer
15 years 6 months ago
Reasoning about Security in Mobile Ambients
The paper gives an assessment of security for Mobile Ambients, with specific focus on mandatory access control (MAC) policies in multilevel security systems. The first part of th...
Michele Bugliesi, Giuseppe Castagna, Silvia Crafa