Sciweavers

705 search results - page 51 / 141
» Security Policy Coordination for Heterogeneous Information S...
Sort
View
IJNSEC
2010
145views more  IJNSEC 2010»
14 years 4 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
15 years 4 months ago
EM Enforcing Information Flow Properties using Compensating Events
Deeply embedded infrastructures are pervasive systems that have significant cyber and physical components, interacting with each other in complex ways. These interactions can vio...
Thoshitha T. Gamage, Bruce M. McMillin
SOSP
2007
ACM
15 years 6 months ago
Information flow control for standard OS abstractions
ion Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek Eddie Kohler† Robert Morris MIT CSAIL †UCLA http://flum...
Maxwell N. Krohn, Alexander Yip, Micah Z. Brodsky,...
JDCTA
2008
119views more  JDCTA 2008»
14 years 9 months ago
Towards a Coordination Infrastructure for Pervasive Computing Environment Based on Tuplespace and Semantic Web
Pervasive computing is an emerging computing paradigm, which is expected to be part of our everyday life in the foreseeable future. The coordination among heterogeneous devices, s...
Liang Li, Bin Li, Junwu Zhu
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
15 years 4 months ago
Information Security: User Precautions, Attacker Efforts, and Enforcement
We analyze the strategic interactions among endusers and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by endusers are strategic subst...
Ivan P. L. Png, Qiu-Hong Wang