Sciweavers

979 search results - page 33 / 196
» Developing Dynamic Security Policies
Sort
View
110
Voted
ESORICS
2007
Springer
15 years 10 months ago
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
Abstract. From a security standpoint, it is preferable to implement least privilege network security policies in which only the bare minimum of TCP/UDP ports on internal hosts are ...
Paul Z. Kolano
123
Voted
ITCC
2005
IEEE
15 years 9 months ago
Formalisation and implementation of Access control models
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Mathieu Jaume, Charles Morisset
PET
2004
Springer
15 years 9 months ago
Language-Based Enforcement of Privacy Policies
Abstract. We develop a language-based approach for modeling and verifying aspects of privacy policies. Our approach relies on information-flow control. Concretely, we use the prog...
Katia Hayati, Martín Abadi
149
Voted
IOR
2008
105views more  IOR 2008»
15 years 3 months ago
The Stochastic Knapsack Revisited: Switch-Over Policies and Dynamic Pricing
The stochastic knapsack has been used as a model in wide ranging applications from dynamic resource allocation to admission control in telecommunication. In recent years, a variat...
Grace Y. Lin, Yingdong Lu, David D. Yao
105
Voted
HICSS
2007
IEEE
93views Biometrics» more  HICSS 2007»
15 years 10 months ago
Using Systems Dynamics to Explore Effects of Counterterrorism Policy
This paper suggests that the effects of counterterrorism policy on Violent Non-State Actors can be explored via systems dynamics. Specifically, we create a descriptive model of th...
Tara Leweling, Otto Sieber