Sciweavers

637 search results - page 62 / 128
» The Case for Abstracting Security Policies
Sort
View
ESORICS
2004
Springer
15 years 5 months ago
Security Property Based Administrative Controls
Abstract. Access control languages which support administrative controls, and thus allow the ordinary permissions of a system to change, have traditionally been constructed with ...
Jon A. Solworth, Robert H. Sloan
FC
2004
Springer
78views Cryptology» more  FC 2004»
15 years 5 months ago
Secure Interaction Design
Abstract. The security of any computer system that is configured or operated by human beings critically depends on the information conveyed by the user interface, the decisions of...
Ka-Ping Yee
IEEESP
2007
98views more  IEEESP 2007»
14 years 11 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
EUROCRYPT
2003
Springer
15 years 5 months ago
Why Provable Security Matters?
Abstract. Recently, methods from provable security, that had been developped for the last twenty years within the research community, have been extensively used to support emerging...
Jacques Stern
ESOP
2003
Springer
15 years 5 months ago
A Tail-Recursive Semantics for Stack Inspections
Security folklore holds that a security mechanism based on stack inspection is incompatible with a global tail call optimization policy. An implementation of such a language may ha...
John Clements, Matthias Felleisen