Sciweavers

253 search results - page 25 / 51
» Provisions and Obligations in Policy Management and Security...
Sort
View
VLDB
1998
ACM
134views Database» more  VLDB 1998»
15 years 4 months ago
Secure Buffering in Firm Real-Time Database Systems
The design of secure buffer managers for database systems supporting real-time applications with firm deadlines is studied here. We first identify the design challenges and then p...
Binto George, Jayant R. Haritsa
SACMAT
2011
ACM
14 years 2 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deï¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
DMDW
2000
118views Management» more  DMDW 2000»
15 years 1 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
SOSP
2009
ACM
15 years 8 months ago
Improving application security with data flow assertions
RESIN is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. RESIN provides policy obje...
Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Fra...
WORDS
2005
IEEE
15 years 5 months ago
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The tempor...
Basit Shafiq, Ammar Masood, James Joshi, Arif Ghaf...