Sciweavers

637 search results - page 7 / 128
» The Case for Abstracting Security Policies
Sort
View
ICC
2008
IEEE
122views Communications» more  ICC 2008»
15 years 3 months ago
Optimizing Adaptive Modulation in Wireless Networks via Utility Maximization
Abstract— We investigate adaptive modulation using the network utility maximization framework. We derive new crosslayer optimal power and rate adaptation policies for several pra...
Daniel O'Neill, Andrea J. Goldsmith, Stephen P. Bo...
SOUPS
2005
ACM
15 years 3 months ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
SP
1999
IEEE
126views Security Privacy» more  SP 1999»
15 years 1 months ago
Flexible Policy-Directed Code Safety
This work introduces a new approach to code safety. We present Naccio, a system architecture that allows a large class of safety policies to be expressed in a general and platform...
David Evans, Andrew Twyman
97
Voted
IJISEC
2008
188views more  IJISEC 2008»
14 years 8 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...
WWW
2002
ACM
15 years 10 months ago
Abstracting application-level web security
ing Application-Level Web Security David Scott Laboratory For Communications Engineering Engineering Department Trumpington Street Cambridge CB2 1PZ djs55@eng.cam.ac.uk Richard Sha...
David Scott, Richard Sharp