Sciweavers

470 search results - page 21 / 94
» From evidence-based policy making to policy analytics
Sort
View
101
Voted
CCS
2009
ACM
16 years 1 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
SACMAT
2003
ACM
15 years 5 months ago
On context in authorization policy
Authorization policy infrastructures are evolving with the complex environments that they support. However, the requirements and technologies supporting context are not yet well u...
Patrick Drew McDaniel
GI
2003
Springer
15 years 5 months ago
Strategic Simulation Games to foster Policy Development for Critical Infrastructure Protection
: Strategic Simulation Games have become an important element of policy development in the context of Critical Infrastructure Protection (CIP). They foster the network between all ...
Matthias Holenstein, Daniel Bircher
106
Voted
DIMVA
2009
15 years 1 months ago
A Service Dependency Modeling Framework for Policy-Based Response Enforcement
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Nizar Kheir, Hervé Debar, Fréd&eacut...
86
Voted
IOR
2006
72views more  IOR 2006»
15 years 16 days ago
Inventory Policies in a Decentralized Assembly System
We consider a system in which a single finished good is assembled from two components. Demand for the finished product is stochastic and stationary, and procurement and assembly l...
Fernando Bernstein, Gregory A. DeCroix