Sciweavers

77 search results - page 5 / 16
» Enforcing security in semantics driven policy based networks
Sort
View
ESORICS
2010
Springer
14 years 10 months ago
A Theory of Runtime Enforcement, with Results
This paper presents a theory of runtime enforcement based on mechanism models called MRAs (Mandatory Results Automata). MRAs can monitor and transform security-relevant actions and...
Jay Ligatti, Srikar Reddy
JHSN
2006
95views more  JHSN 2006»
14 years 9 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
SACMAT
2005
ACM
15 years 3 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
ESORICS
2004
Springer
15 years 3 months ago
An Algebra for Composing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with d...
Michael Backes, Markus Dürmuth, Rainer Steinw...
PERCOM
2005
ACM
15 years 9 months ago
Policy-Driven Data Dissemination for Context-Aware Applications
Context-aware pervasive-computing applications require continuous monitoring of their physical and computational environment to make appropriate adaptation decisions in time. The ...
Guanling Chen, David Kotz