Sciweavers

1278 search results - page 1 / 256
» The representation of policies as system objects
Sort
View
GROUP
1991
ACM
13 years 10 months ago
The representation of policies as system objects
Jonathan D. Moffett, Morris Sloman
CACM
1999
108views more  CACM 1999»
13 years 6 months ago
Privacy Interfaces for Information Management
To facilitate the sharing of information using modern communication networks, users must be able to decide on a privacy policy--what information to conceal, what to reveal, and to...
Tessa A. Lau, Oren Etzioni, Daniel S. Weld
ISCC
2005
IEEE
13 years 12 months ago
Trie-Based Policy Representations for Network Firewalls
Network firewalls remain the forefront defense for most computer systems. These critical devices filter traffic by comparing arriving packets to a list of rules, or security po...
Errin W. Fulp, Stephen J. Tarsa
EDOC
2000
IEEE
13 years 10 months ago
Ponder: Realising Enterprise Viewpoint Concepts
This paper introduces the Ponder language for specifying distributed object enterprise concepts. Ponder, is a declarative language, which permits the specification of policies in ...
Emil Lupu, Morris Sloman, Naranker Dulay, Nicodemo...
DBSEC
2009
124views Database» more  DBSEC 2009»
13 years 7 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn