Sciweavers

44 search results - page 4 / 9
» Formal Verification of Firewall Policies
Sort
View
COMPSEC
2004
104views more  COMPSEC 2004»
14 years 11 months ago
Formal support for certificate management policies
Traditionally, creation and revocation of certificates are governed by policies that are carried manually, off-line, by trusted agents. This approach to certificate management is ...
Victoria Ungureanu
CCS
2008
ACM
15 years 1 months ago
A formal framework for reflective database access control policies
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an acce...
Lars E. Olson, Carl A. Gunter, P. Madhusudan
LISA
2003
15 years 1 months ago
DryDock: A Document Firewall
Auditing a web site’s content is an arduous task. For any given page on a web server, system administrators are often ill-equipped to determine who created the document, why itâ...
Deepak Giridharagopal
CCR
2000
78views more  CCR 2000»
14 years 11 months ago
Some guidelines for non-repudiation protocols
Non-repudiation protocols aim at preventing parties in a communication from falsely denying having taken part in that communication; for example, a non-repudiation protocol for di...
Panagiotis Louridas
FORMATS
2007
Springer
15 years 3 months ago
Combining Formal Verification with Observed System Execution Behavior to Tune System Parameters
Resource limited DRE (Distributed Real-time Embedded) systems can benefit greatly from dynamic adaptation of system parameters. We propose a novel approach that employs iterative t...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...