Sciweavers

591 search results - page 54 / 119
» Embracing policy engineering
Sort
View
WSC
2008
15 years 3 days ago
Iterative use of simulation and scheduling methodologies to improve productivity
Experienced and wise industrial engineering educators and practitioners have long understood that industrial engineering is a coherent discipline encompassing techniques that work...
Karthik Krishna Vasudevan, Ravindra Lote, Edward J...
APSEC
2003
IEEE
15 years 3 months ago
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec
Despite a growing awareness of security issues in networked computing systems, most development processes used today still do not take security aspects into account. To address th...
Siv Hilde Houmb, Jan Jürjens
COMPSAC
2005
IEEE
14 years 11 months ago
A Novel Method for Protecting Sensitive Knowledge in Association Rules Mining
Discovering frequent patterns from huge amounts of data is one of the most studied problems in data mining. However, some sensitive patterns with security policies may cause a thr...
En Tzu Wang, Guanling Lee, Yu Tzu Lin
CSFW
2004
IEEE
15 years 1 months ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell
ACSAC
2007
IEEE
15 years 4 months ago
Channels: Runtime System Infrastructure for Security-Typed Languages
Security-typed languages (STLs) are powerful tools for provably implementing policy in applications. The programmer maps policy onto programs by annotating types with information ...
Boniface Hicks, Tim Misiak, Patrick McDaniel