Sciweavers

637 search results - page 20 / 128
» The Case for Abstracting Security Policies
Sort
View
ESORICS
2004
Springer
15 years 2 months ago
An Algebra for Composing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with d...
Michael Backes, Markus Dürmuth, Rainer Steinw...
ECOOP
2012
Springer
12 years 12 months ago
Enhancing JavaScript with Transactions
Abstract. Transcript is a system that enhances JavaScript with support for transactions. Hosting Web applications can use transactions to demarcate regions that contain untrusted g...
Mohan Dhawan, Chung-chieh Shan, Vinod Ganapathy
73
Voted
SEMWEB
2010
Springer
14 years 7 months ago
A Self-Policing Policy Language
Abstract. Formal policies allow the non-ambiguous definition of situations in which usage of certain entities are allowed, and enable the automatic evaluation whether a situation i...
Sebastian Speiser, Rudi Studer
83
Voted
CSFW
2008
IEEE
14 years 11 months ago
End-to-End Enforcement of Erasure and Declassification
Declassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of comple...
Stephen Chong, Andrew C. Myers
PET
2004
Springer
15 years 2 months ago
Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine
Abstract. Although the number of online privacy policies is increasing, it remains difficult for Internet users to understand them, let alone to compare policies across sites or i...
Simon Byers, Lorrie Faith Cranor, David P. Kormann...