Sciweavers

2422 search results - page 20 / 485
» Security Policy Consistency
Sort
View
CSFW
1999
IEEE
15 years 4 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
CSFW
2006
IEEE
15 years 5 months ago
Managing Policy Updates in Security-Typed Languages
Nikhil Swamy, Michael Hicks, Stephen Tse, Steve Zd...
CCS
2006
ACM
15 years 1 months ago
Vulnerability analysis For evaluating quality of protection of security policies
Muhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latif...
ACSAC
2008
IEEE
15 years 6 months ago
Enforcing Role-Based Access Control Policies in Web Services with UML and OCL
Karsten Sohr, Tanveer Mustafa, Xinyu Bao, Gail-Joo...