Sciweavers

1183 search results - page 37 / 237
» On flow-sensitive security types
Sort
View
ACSAC
2001
IEEE
15 years 8 months ago
Security Policy Enforcement at the File System Level in the Windows NT Operating System Family
This paper describes the implementation of an enforcement module for file system security implemented as part of a security architecture for distributed systems which enforces a c...
Stephen D. Wolthusen
ACSC
2002
IEEE
15 years 9 months ago
Bracket Capabilities for Distributed Systems Security
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
Mark Evered
ECIS
2001
15 years 5 months ago
Web Security: The Emperor's New Armour
The World Wide Web originally provided no security services because it was not designed to support sensitive applications. As the Web evolved to become a platform for all types of...
Audun Jøsang, Peter M. Møllerud, Edd...
CORR
2007
Springer
123views Education» more  CORR 2007»
15 years 4 months ago
Security in Wireless Sensor Networks: Issues and Challenges
 Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology c...
Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon H...
CORR
2000
Springer
87views Education» more  CORR 2000»
15 years 4 months ago
Security Policy Consistency
With the advent of wide security platforms able to express simultaneously all the policies comprising an organization's global security policy, the problem of inconsistencies...
Carlos Ribeiro, Andre Zuquete, Paulo Ferreira, Pau...