Sciweavers

705 search results - page 15 / 141
» Security Policy Coordination for Heterogeneous Information S...
Sort
View
CDC
2008
IEEE
139views Control Systems» more  CDC 2008»
15 years 4 months ago
Human-in-the-loop vehicle routing policies for dynamic environments
— In this paper we design coordination policies for a routing problem requiring human-assisted classification of targets through analysis of information gathered on-site by auto...
Ketan Savla, Tom Temple, Emilio Frazzoli
IMCS
2007
78views more  IMCS 2007»
14 years 10 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri
ACSAC
2003
IEEE
15 years 3 months ago
An Editor for Adaptive XML-Based Policy Management of IPsec
The IPsec protocol provides a mechanism to enforce a range of security services for both confidentiality and integrity, enabling secure transmission of information across networks...
Raj Mohan, Timothy E. Levin, Cynthia E. Irvine
ACMSE
2006
ACM
15 years 4 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
ACSAC
2006
IEEE
15 years 4 months ago
From Languages to Systems: Understanding Practical Application Development in Security-typed Languages
Security-typed languages are an evolving tool for implementing systems with provable security guarantees. However, to date, these tools have only been used to build simple “toy...
Boniface Hicks, Kiyan Ahmadizadeh, Patrick Drew Mc...