Sciweavers

2422 search results - page 24 / 485
» Security Policy Consistency
Sort
View
CSFW
2004
IEEE
15 years 1 months ago
Owned Policies for Information Security
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Hubie Chen, Stephen Chong
67
Voted
CSREASAM
2008
14 years 11 months ago
Securing Security Policies in Autonomic Computing Systems
Ghassan Jabbour, Daniel A. Menascé
58
Voted
PLDI
2011
ACM
14 years 14 days ago
A security policy oracle: detecting security holes using multiple API implementations
Varun Srivastava, Michael D. Bond, Kathryn S. McKi...
79
Voted
SOSP
2009
ACM
15 years 6 months ago
Fabric: a platform for secure distributed computation and storage
Fabric is a new system and language for building secure distributed information systems. It is a decentralized system that allows heterogeneous network nodes to securely share bot...
Jed Liu, Michael D. George, K. Vikram, Xin Qi, Luc...
ECEASST
2010
14 years 4 months ago
Security Evaluation and Hardening of Free and Open Source Software (FOSS)
Abstract: Recently, Free and Open Source Software (FOSS) has emerged as an alternative to Commercial-Off-The-Shelf (COTS) software. Now, FOSS is perceived as a viable long-term sol...
Robert Charpentier, Mourad Debbabi, Dima Alhadidi,...