Sciweavers

705 search results - page 63 / 141
» Security Policy Coordination for Heterogeneous Information S...
Sort
View
PERCOM
2005
ACM
15 years 9 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
IEEEARES
2006
IEEE
15 years 3 months ago
The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine
Healthcare organisations practicing evidence-based medicine strive to unite their data assets in order to achieve a wider knowledge base for more sophisticated research as well as...
Nevena Stolba, Marko Banek, A. Min Tjoa
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
15 years 1 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
IFIPTM
2010
97views Management» more  IFIPTM 2010»
14 years 8 months ago
Securing Class Initialization
Abstract. Language-based information-flow security is concerned with specifying and enforcing security policies for information flow via language constructs. Although much progre...
Keiko Nakata, Andrei Sabelfeld
ECAI
2006
Springer
15 years 1 months ago
Advanced Policy Explanations on the Web
Abstract. The frameworks for protecting security and privacy can be effective only if common users--with no training in computer science or logic--increase their awareness and cont...
Piero A. Bonatti, Daniel Olmedilla, Joachim Peer