Sciweavers

370 search results - page 52 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
ENTCS
2007
199views more  ENTCS 2007»
15 years 5 months ago
Heuristics for Safety and Security Constraints
The flow logic approach to static analysis amounts to specifying the admissibility of solutions to analysis problems; when specified using formulae in stratified alternation-fr...
Flemming Nielson, Hanne Riis Nielson
GECCO
2008
Springer
123views Optimization» more  GECCO 2008»
15 years 6 months ago
MLS security policy evolution with genetic programming
In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is becoming much more complex. S...
Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John ...
141
Voted
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
15 years 9 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
154
Voted
ASPLOS
2006
ACM
15 years 11 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...
197
Voted
GECCO
2011
Springer
261views Optimization» more  GECCO 2011»
14 years 8 months ago
Spacing memetic algorithms
We introduce the Spacing Memetic Algorithm (SMA), a formal evolutionary model devoted to a systematic control of spacing (distances) among individuals. SMA uses search space dista...
Daniel Cosmin Porumbel, Jin-Kao Hao, Pascale Kuntz