Sciweavers

591 search results - page 10 / 119
» Embracing policy engineering
Sort
View
CCS
2008
ACM
14 years 11 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
DEXA
2001
Springer
101views Database» more  DEXA 2001»
15 years 2 months ago
A Popularity-Driven Caching Scheme for Meta-search Engines: An Empirical Study
Caching issues in meta-search engines are considered. We propose a popularity-driven cache algorithm that utilizes both popularities and reference counters of queries to determine ...
Sang Ho Lee, Jin Seon Hong, Larry Kerschberg
CCS
2005
ACM
15 years 3 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
SP
2000
IEEE
134views Security Privacy» more  SP 2000»
15 years 2 months ago
Fang: A Firewall Analysis Engine
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Alain J. Mayer, Avishai Wool, Elisha Ziskind
74
Voted
CODES
2005
IEEE
15 years 3 months ago
Efficient behavior-driven runtime dynamic voltage scaling policies
Fen Xie, Margaret Martonosi, Sharad Malik