Sciweavers

244 search results - page 22 / 49
» Dynamic Dependency Monitoring to Secure Information Flow
Sort
View
72
Voted
CCS
2009
ACM
15 years 10 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
CSE
2009
IEEE
15 years 4 months ago
A Hybrid Enforcement Model for Group-centric Secure Information Sharing
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...
Ram Krishnan, Ravi S. Sandhu
79
Voted
DBSEC
2008
137views Database» more  DBSEC 2008»
14 years 11 months ago
Towards Automation of Testing High-Level Security Properties
Abstract. Many security problems only become apparent after software is deployed, and in many cases a failure has occurred prior to the awareness of the problem. Although many woul...
Aiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad ...
IJCAI
1989
14 years 10 months ago
A Focused, Context-Sensitive Approach to Monitoring
We address two issues which arise in the task of detecting anomalous behavior in complex systems with numerous sensor channels: how to adjust alarm thresholds dynamically, within ...
Richard J. Doyle, Suzanne M. Sellers, David Atkins...
CCS
2006
ACM
15 years 1 months ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth