Sciweavers

5757 search results - page 52 / 1152
» Dynamic Policy Programming
Sort
View
125
Voted
ACSAC
2006
IEEE
15 years 4 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...
101
Voted
CSFW
2005
IEEE
15 years 6 months ago
Language-Based Information Erasure
Real computing systems sometimes need to forget sensitive information. This paper explores the specification and semantics of information erasure policies, which impose a strong,...
Stephen Chong, Andrew C. Myers
90
Voted
CHI
2010
ACM
15 years 7 months ago
Generating default privacy policies for online social networks
Default privacy policies have a significant impact on the overall dynamics and success of online social networks, as users tend to keep their initial privacy policies. In this wor...
Eran Toch, Norman M. Sadeh, Jason I. Hong
87
Voted
EGOV
2005
Springer
15 years 6 months ago
Monitoring and Updating Regulations and Policies for Government Services
One of the challenges citizens and businesses face in interacting with governments for entitled services or compliance services is to find the right set of regulations and rules th...
Soon Ae Chun, Edwin Portscher, James Geller
ESWS
2010
Springer
15 years 5 months ago
Reactive Policies for the Semantic Web
Semantic Web policies are general statements defining the behavior of a system that acts on behalf of real users. These policies have various applications ranging from dynamic age...
Piero A. Bonatti, Philipp Kärger, Daniel Olme...