Sciweavers

370 search results - page 56 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
SOSP
2007
ACM
15 years 10 months ago
Information flow control for standard OS abstractions
ion Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek Eddie Kohler† Robert Morris MIT CSAIL †UCLA http://flum...
Maxwell N. Krohn, Alexander Yip, Micah Z. Brodsky,...
ESSOS
2010
Springer
15 years 10 months ago
Idea: Towards Architecture-Centric Security Analysis of Software
Static security analysis of software has made great progress over the last years. In particular, this applies to the detection of lowlevel security bugs such as buffer overflows,...
Karsten Sohr, Bernhard Berger
ENTCS
2007
112views more  ENTCS 2007»
15 years 1 months ago
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
108
Voted
IJET
2008
95views more  IJET 2008»
15 years 11 days ago
Supporting life-long competence development using the TENCompetence infrastructure: a first experiment
This paper describes an experiment to explore the effects of the TENCompetence infrastructure for supporting lifelong competence development which is now in development. This infra...
Judith Schoonenboom, Henk Sligte, Ayman Moghnieh, ...
143
Voted
CCS
2004
ACM
15 years 7 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...