Sciweavers

705 search results - page 26 / 141
» Security Policy Coordination for Heterogeneous Information S...
Sort
View
ESORICS
2002
Springer
15 years 9 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
ROBOCOMM
2007
IEEE
15 years 4 months ago
Cooperative information fusion in a network robot system
—The vision of network robot systems involves robots embedded in smart environments, with which they can collaborate and communicate. In such systems, robots have access to many ...
Kevin LeBlanc, Alessandro Saffiotti
ACSAC
2001
IEEE
15 years 1 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson
DEXAW
1999
IEEE
75views Database» more  DEXAW 1999»
15 years 2 months ago
Coordination of Security Levels for Internet Architectures
Internet systems provide a variety of ways to exchange information, contain large amounts and variety of data, and have become quite complex, making them vulnerable to attacks fro...
Eduardo B. Fernández
LISP
2002
81views more  LISP 2002»
14 years 9 months ago
Secure Information Flow via Linear Continuations
Security-typed languages enforce secrecy or integrity policies by type-checking. This paper investigates continuation-passing style (CPS) as a means of proving that such languages...
Steve Zdancewic, Andrew C. Myers