Results
Found 1302 publication records. Showing 1302 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
216 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. |
SACMAT |
2011 |
DBLP DOI BibTeX RDF |
|
91 | Debabrata Nayak |
An Adaptive and Optimized Security Policy Manager for Wireless Networks. |
Asia International Conference on Modelling and Simulation |
2007 |
DBLP DOI BibTeX RDF |
Network Element, Security Policy index, Security Policy Factor, SQoS, Policy optimizer |
86 | Steven J. Greenwald |
E-Prime for security: a new security paradigm. |
NSPW |
2006 |
DBLP DOI BibTeX RDF |
Clark-Wilson, E-Prime, Sapir-Whorf hypothesis, disaster planning, enterprise security policy, general semantics, incident handling, informal security policy modeling, organizational security policy, principle of linguistic relativity, security life cycle, software life cycle SP800-12, user awareness, user centered security, user support and operations, modeling, formal methods, planning, RBAC, role-based access control, risk management, information assurance, security engineering, life cycle, spam detection, user training, security policy modeling, program management |
73 | Padmalochan Bera, Soumya Kanti Ghosh 0001, Pallab Dasgupta |
Formal Verification of Security Policy Implementations in Enterprise Networks. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
Access control list (ACL), Formal Verification, Network security, Security Policy |
72 | Yi-Ming Chen 0008, Yung-Wei Kao |
Information Flow Query and Verification for Security Policy of Security-Enhanced Linux. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
information flow, security policy, Colored Petri Nets, SELinux |
69 | Yiwen Liang, Wenjun Deng |
Verify Consistency between Security Policy and Firewall Policy with Answer Set Programming. |
CSSE (1) |
2008 |
DBLP DOI BibTeX RDF |
|
65 | Julien Brunel, Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Jean-Paul Bodeveix |
Security policy compliance with violation management. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
labeled kripke structure, temporal logic, security policy, deontic logic, violation |
65 | Nazim Benaïssa, Dominique Cansell, Dominique Méry |
Integration of Security Policy into System Modeling. |
B |
2007 |
DBLP DOI BibTeX RDF |
integration, refinement, security policy |
64 | Igor V. Kotenko, Artem Tishkov, Olga Chervatuk, Ekaterina Sidelnikova |
Security Policy Verification Tool for Geographical Information Systems. |
IF&GIS |
2007 |
DBLP DOI BibTeX RDF |
Security, verification, security policy |
62 | Patrick C. K. Hung, Guang-Sha Qiu |
Specifying conflict of interest assertions in WS-policy with Chinese wall security policy. |
SIGecom Exch. |
2003 |
DBLP DOI BibTeX RDF |
WS-policy attachment, security assertion, XML, security policy, delegation, matchmaking, conflict of interest, WS-policy, service locators, Chinese wall security policy |
61 | Gaoshou Zhai, Wenlin Ma, Minli Tian, Na Yang, Chengyu Liu, Hengsheng Yang |
Design and implementation of a tool for analyzing SELinux secure policy. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
security policy configuration, security policy description language, SELinux, integrity verification |
59 | Maxim Schnjakin, Michael Menzel 0001, Christoph Meinel |
A pattern-driven security advisor for service-oriented architectures. |
SWS |
2009 |
DBLP DOI BibTeX RDF |
ws-security-policy, security, web service, soa |
55 | Chenghua Tang, Shunzheng Yu |
Assessment of Network Security Policy Based on Security Capability. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Rasool Jalili, Mohsen Rezvani |
Specification and Verification of Security Policies in Firewalls. |
EurAsia-ICT |
2002 |
DBLP DOI BibTeX RDF |
Formal Specification, Security Policy, Firewall |
54 | Fumiko Satoh, Takehiro Tokuda |
Security Policy Composition for Composite Services. |
ICWE |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Saravanan Muthaiyah, Larry Kerschberg |
Virtual organization security policies: An ontology-based integration approach. |
Inf. Syst. Frontiers |
2007 |
DBLP DOI BibTeX RDF |
Security policy ontology, Security policy domain model, Ontology mapping, Semantic mapping |
52 | Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood |
Employees' Behavior towards IS Security Policy Compliance. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
51 | Phu H. Phung, David Sands 0001 |
Security Policy Enforcement in the OSGi Framework Using Aspect-Oriented Programming. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
Security policy enforcement, vehicle software, middleware, Aspect-oriented programming, OSGi, reference monitors |
50 | Won Young Lee, Hee Suk Seo, Tae Ho Cho |
Modeling of Policy-Based Network with SVDB. |
AIS |
2004 |
DBLP DOI BibTeX RDF |
PBNM (Policy-based Network Management), simulation, Data Mining, network security, Security Policy, DEVS formalism |
49 | Chenghua Tang, Shuping Yao, Zhongjie Cui, Limin Mao |
A Network Security Policy Model and Its Realization Mechanism. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
access control, Security policy, domain, rule engine |
49 | Stephen S. Yau, Zhaoji Chen |
Security Policy Integration and Conflict Reconciliation for Collaborations among Organizations in Ubiquitous Computing Environments. |
UIC |
2008 |
DBLP DOI BibTeX RDF |
Security policy integration, conflict reconciliation, organization collaboration, similarity-based policy adaptation, negotiation-based policy reconciliation, ontology, ubiquitous computing environments |
48 | James Bret Michael, Vanessa L. Ong, Neil C. Rowe |
Natural-Language Processing Support for Developing Policy-Governed Software Systems. |
TOOLS (39) |
2001 |
DBLP DOI BibTeX RDF |
|
48 | Patrick D. McDaniel, Atul Prakash 0001 |
Methods and limitations of security policy reconciliation. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
Security policy |
48 | Michael J. Petkac, Lee Badger |
Security Agility in Response to Intrusion Detection. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
security agility, cooperative frameworks, malicious attacks, mission critical functionality, security policy reconfiguration, runtime security policy change, prototype toolkit, flexible host-based response, distributed systems, intrusion detection, distributed processing, software components, security of data |
45 | George Yee, Larry Korba |
Negotiated Security Policies for E-Services and Web Services. |
ICWS |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Fumiko Satoh, Yumi Yamaguchi |
Generic Security Policy Transformation Framework for WS-Security. |
ICWS |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Frédéric Cuppens, Claire Saurel |
Specifying a security policy: a case study. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
high risk environment, interoperability problems, logic-based approach, formal specification, consistency, completeness, security of data, formal logic, deontic logic, security policy specification |
44 | Vijay Varadharajan |
Network Security Policy Models. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
44 | Symon Chang, Qiming Chen, Meichun Hsu |
Managing Security Policy in a Large Distributed Web Services Environment. |
COMPSAC |
2003 |
DBLP DOI BibTeX RDF |
|
44 | Geon Woo Kim 0001, So-Hee Park, Jaehoon Nah, Sung Won Sohn |
Security Policy Deployment in IPsec. |
ICOIN (2) |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Myla Archer, Elizabeth I. Leonard, Matteo Pradella |
Modeling Security-Enhanced Linux Policy Specifications for Analysis. |
DISCEX (2) |
2003 |
DBLP DOI BibTeX RDF |
|
43 | Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis |
An Ontology-Based Approach to Information Systems Security Management. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
IS Security, Security Policy, Security Management, Security Ontology |
43 | Mohamad Aljnidi, Jean Leneutre |
A security policy system for mobile autonomic networks. |
Autonomics |
2007 |
DBLP DOI BibTeX RDF |
security policy management, ad-hoc networks, autonomic computing, security models, autonomic networks |
42 | Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fengmin Gong, Ilia Baldine, Chong Xu |
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution. |
POLICY |
2001 |
DBLP DOI BibTeX RDF |
|
41 | John P. McDermott, Leo Freitas |
A formal security policy for xenon. |
FMSE |
2008 |
DBLP DOI BibTeX RDF |
refinement, open-source, z, csp, hypervisor, information-flow security, circus |
41 | Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia |
Enabling automated threat response through the use of a dynamic security policy. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Sudsanguan Ngamsuriyaroj, Ali R. Hurson, Thomas F. Keefe |
Maintaining Consistency of the Security Policy using Timestamp Ordering. |
ITCC |
2002 |
DBLP DOI BibTeX RDF |
Performance, Concurrency control, Security policy, Consistency control, Timestamp ordering |
40 | David F. Ferraiolo, Vijay Atluri |
A meta model for access control: why is it needed and is it even possible to achieve? |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Fuwen Liu, Hartmut König |
Security Policy Management for Peer Group Meetings. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Pierre-Alain Masson, Jacques Julliand, Jean-Chritophe Plessis, Eddie Jaffuel, Georges Debois |
Automatic generation of model based tests for a class of security properties. |
A-MOST |
2007 |
DBLP DOI BibTeX RDF |
security policy, automatic test generation, security properties |
38 | Tejeddine Mouelhi, Franck Fleurey, Benoit Baudry, Yves Le Traon |
A Model-Based Framework for Security Policy Specification, Deployment and Testing. |
MoDELS |
2008 |
DBLP DOI BibTeX RDF |
Model-driven engineering methodology, Security, Metamodeling |
38 | Almut Herzog, Nahid Shahmehri |
A Usability Study of Security Policy Management. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Charles R. Young |
A security policy for a profile-oriented operating system. |
AFIPS National Computer Conference |
1981 |
DBLP DOI BibTeX RDF |
|
38 | Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Laurent Toutain, Yehia Elrakaiby |
Semantic context aware security policy deployment. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
access control, network security, PDP, PEP |
38 | Moon Sun Shin, Hosung Moon, Keun Ho Ryu, Kiyoung Kim, Jinoh Kim |
Applying Data Mining Techniques to Analyze Alert Data. |
APWeb |
2003 |
DBLP DOI BibTeX RDF |
|
38 | George Yee |
Personalized Security for E-Services. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham |
Detection and Resolution of Anomalies in Firewall Policy Rules. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
Network Security, Security Policy, Firewalls, Anomalies, Packet Filters |
37 | Laurent George 0002, Valérie Viet Triem Tong, Ludovic Mé |
Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Jihène Krichène, Mohamed Hamdi, Noureddine Boudriga |
Security policy validation using temporal executable specifications. |
SMC |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Petros Efstathopoulos, Eddie Kohler |
Manageable fine-grained information flow. |
EuroSys |
2008 |
DBLP DOI BibTeX RDF |
decentralized information flow control, debugging, labels, policy language |
37 | Kouichi Ono, Yuichi Nakamura 0003, Fumiko Satoh, Takaaki Tateishi |
Verifying the Consistency of Security Policies by Abstracting into Security Types. |
ICWS |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Igor V. Kotenko, Olga Chervatuk, Ekaterina Sidelnikova, Artem Tishkov |
Hybrid Multi-module Security Policy Verification. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Klaus Peter Fischer, Udo Bleimann, Steven Furnell |
Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes. |
TrustBus |
2007 |
DBLP DOI BibTeX RDF |
Business Process Execution Language (BPEL), Grid Processes, Security Policy Enforcement, Virtual Organizations, Grid Services, Information Flow Analysis |
36 | Xiaodong Yi 0002, Xuejun Yang |
A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
Information Flow Security Policy, Security Verification, Secure Operating System |
36 | Nils Gruschka, Meiko Jensen, Torben Dziuk |
Event-based application of ws-security policy on soap messages. |
SWS |
2007 |
DBLP DOI BibTeX RDF |
event-based processing, web services, WS-security |
36 | Sid Stamm, Brandon Sterne, Gervase Markham |
Reining in the web with content security policy. |
WWW |
2010 |
DBLP DOI BibTeX RDF |
content restrictions, security policy, http, web security |
36 | Teo Poh Kuang, Hamidah Ibrahim |
Security privacy access control for policy integration and conflict reconciliation in health care organizations collaborations. |
iiWAS |
2009 |
DBLP DOI BibTeX RDF |
conflict reconciliation, cross-organization collaboration, security policy integration, role-based access control, logical reasoning |
35 | Patrick D. McDaniel, Atul Prakash 0001 |
Methods and Limitations of Security Policy Reconciliation. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Raj Mohan, Timothy E. Levin, Cynthia E. Irvine |
An Editor for Adaptive XML-Based Policy Management of IPsec. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Xuhui Ao, Naftaly H. Minsky |
Flexible Regulation of Distributed Coalitions. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
Distributed coalition, Decentralized regulatory mechanism, Policy hierarchy, Policy interoperability, Security policy, Law-Governed Interaction |
34 | Patrick D. McDaniel, Atul Prakash 0001 |
A Flexible Architecture for Security Policy Enforcement. |
DISCEX (2) |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Gustavo A. Santana Torrellas |
A Framework for Multi-Agent System Engineering using Ontology Domain Modelling for Security Architecture Risk Assessment in E-Commerce Security Services. |
NCA |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Anu Singh, C. R. Ramakrishnan 0001, I. V. Ramakrishnan, Scott D. Stoller, David Scott Warren |
Security policy analysis using deductive spreadsheets. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
SELinux policy, security policy analysis, vulnerability analysis |
34 | Matthias Schwan |
An extended model of security policy for multi-applicative smart cards. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
biometrics, smart cards, security policy, electronic signatures |
34 | Rodolphe Ortalo |
A Flexible Method for Information System Security Policy Specification. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
information systems, deontic logic, security policy specification |
34 | Christos Fragos, Maria Karyda 0001, Evangelos A. Kiountouzis |
Using the Lens of Circuits of Power in Information Systems Security Management. |
TrustBus |
2007 |
DBLP DOI BibTeX RDF |
information systems security management, Circuits of Power Framework, power, security policy |
34 | Geon Woo Kim 0001, Deok-Gyu Lee, Jong Wook Han, Sang-Choon Kim, Sang Wook Kim |
Security Framework for Home Network: Authentication, Authorization, and Security Policy. |
PAKDD Workshops |
2007 |
DBLP DOI BibTeX RDF |
Security, Authentication, Access Control, Authorization, Security Policy, Home Network |
34 | Toshihiro Yokoyama, Miyuki Hanaoka, Makoto Shimamura, Kenji Kono |
Simplifying security policy descriptions for internet servers in secure operating systems. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
policy description, SELinux, internet server, secure operating system |
34 | George Angelis, Stefanos Gritzalis, Costas Lambrinoudakis |
Security Policy Configuration Issues in Grid Computing Environments. |
SAFECOMP |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Heng Yin 0001, Haining Wang |
Building an application-aware IPsec policy system. |
IEEE/ACM Trans. Netw. |
2007 |
DBLP DOI BibTeX RDF |
IP, computer network security, communication system security |
34 | Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan |
A Novel Quantitative Approach For Measuring Network Security. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
34 | William R. Claycomb, Rodrigo Lopes, Dongwan Shin, Byunggi Kim |
A group-based security policy for wireless sensor networks. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
wireless sensor network, access control, security policy |
34 | Sachoun Park, Gihwon Kwon |
Verification of UML-Based Security Policy Model. |
ICCSA (3) |
2005 |
DBLP DOI BibTeX RDF |
Formal verification, Role-based access control, Visual specification, Security policy model |
34 | Ross J. Anderson |
A Security Policy Model for Clinical Information Systems. |
S&P |
1996 |
DBLP DOI BibTeX RDF |
personal health information protection, medical ethics, privacy threats, restricted user numbers, restricted record numbers, strong notification property enforcement, localized information exposure, private banking, intelligence data management, security of data, data privacy, medical information systems, information flow control, DP management, clinical information systems, security policy model |
34 | Laurence Cholvy, Frédéric Cuppens |
Analyzing Consistency of Security Policies. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
security policy consistency analysis, deontic formulae, normative conflicts, role priorities, methodology, problem solving, roles, formal language, security of data, regulation, formal logic |
33 | Sharman Lichtenstein |
Developing Internet Security Policy for Organizations. |
HICSS (4) |
1997 |
DBLP DOI BibTeX RDF |
|
33 | Patrick C. K. Hung, Guang-Sha Qui |
Implementing conflict of interest assertions in WS-policy with separation of duties for Web-Services matchmaking process. |
Inf. Syst. E Bus. Manag. |
2004 |
DBLP DOI BibTeX RDF |
Matchmaking process, Separation of duties, Conflict of interest, WS-policy, Chinese wall security policy |
33 | Patrick C. K. Hung, Guang-Sha Qiu |
Implementing Conflict of Interest Assertions for Web Services Matchmaking Process. |
CEC |
2003 |
DBLP DOI BibTeX RDF |
WS-PolicyAttachment, Matchmaking, Conflict of interest, WS-Policy, Service locators, Chinese wall security policy |
32 | Michael Manley, Cheri McEntee, Anthony Molet, Joon S. Park |
Towards an Effective Wireless Security Policy for Sensitive Organizations. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Peter Herrmann |
Formal Security Policy Verification of Distributed Component-Structured Software. |
FORTE |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Rudolf Schreiner, Ulrich Lang 0001 |
Protection of complex distributed systems. |
Middleware Security |
2008 |
DBLP DOI BibTeX RDF |
service oriented architecture, distributed systems security, model driven security |
32 | Satoru Tezuka, Ryôichi Sasaki, Masanori Kataoka |
Seamless Object Authentication in Different Security Policy Domains. |
HICSS |
2000 |
DBLP DOI BibTeX RDF |
|
32 | M. Nash, R. J. Kennett |
Implementing Security Policy in a Large Defense Procurement. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
|
32 | Aneta Poniszewska-Maranda |
Security Constraints in Access Control of Information System Using UML Language. |
WETICE |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Thomas Hardjono, Hugh Harney |
Group Security Policy Management for IP Multicast and Group Security. |
NETWORKING |
2002 |
DBLP DOI BibTeX RDF |
|
32 | Kuong-Ho Chen, Yuan-Siao Liu, Tzong-Jye Liu, Chyi-Ren Dow |
ZERO-Conflict: A Grouping-Based Approach for Automatic Generation of IPSec/VPN Security Policies. |
DSOM |
2006 |
DBLP DOI BibTeX RDF |
IP security, network management, security policy, security requirement, policy conflict |
32 | Handan Gül Çalikli, M. Ufuk Çaglayan |
A Formal Policy Specification Language for an 802.11 WLAN with Enhanced Security Network. |
ISCIS |
2005 |
DBLP DOI BibTeX RDF |
Administrative Domain, 802.11 Wireless Local Area Network (WLAN), Mobadtl, Security Policy |
32 | Manfred Holzbach |
Security Measures For The Austrian "Paychip" Electronic Purse Application. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
PAYCHIP, management-oriented description, Austrian nationwide electronic purse scheme, QUICK scheme, national security policy, security level evaluation, payment security maintenance, chip-card based payment infrastructure, Europay Austria, security of data, design principles, security measures |
31 | Subhendu Aich, Shamik Sural, Arun K. Majumdar |
Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy. |
TrustBus |
2008 |
DBLP DOI BibTeX RDF |
Spatiotemporal event, Policy connectives, Location hierarchy, RBAC |
31 | Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W. Smith |
Pastures: Towards Usable Security Policy Engineering. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Sook-Yeon Kim, Myung-Eun Kim, Kiyoung Kim, Jongsoo Jang |
Information Model for Policy-Based Network Security Management. |
ICOIN (1) |
2002 |
DBLP DOI BibTeX RDF |
|
31 | Mahdi Seify |
New Method for Risk Management in CRM Security Management. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
Information Security Management System (ISMS), Data management, Risk Management, Customer Relationship Management (CRM) |
31 | Robert Grimm 0001, Brian N. Bershad |
Separating access control policy, enforcement, and functionality in extensible systems. |
ACM Trans. Comput. Syst. |
2001 |
DBLP DOI BibTeX RDF |
access check, policy-neutral enforcement, protection domain transfer, Java, security policy, auditing, SPIN, extensible systems, protection domain |
30 | Klaus Peter Fischer, Udo Bleimann, Woldemar F. Fuhrmann, Steven Furnell |
Security Policy Enforcement in BPEL-Defined Collaborative Business Processes. |
ICDE Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Boniface Hicks, Kiyan Ahmadizadeh, Patrick D. McDaniel |
From Languages to Systems: Understanding Practical Application Development in Security-typed Languages. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Minji Kim, Younghee Lee |
TDM: Enforcement of Security Management System for XML-Centric Electronic Commerce. |
Human.Society@Internet 2003 |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Brian Shand, Jem Rashbass |
Security for middleware extensions: event meta-data for enforcing security policy. |
Middleware Security |
2008 |
DBLP DOI BibTeX RDF |
middleware, extensions, policy specification |
30 | Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt |
Formal Reasoning About Intrusion Detection Systems. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
verification, formal method, Intrusion detection, security policy |
30 | Xiaofeng Gong, Julian Newman |
The Role of Deontic Concepts and Commitment in the Policy Specification of Mobile Computing Environment. |
OTM Workshops |
2003 |
DBLP DOI BibTeX RDF |
deontic concepts, speech acts oriented communication, mobile computing, Commitment, commitments, security policy specification |
30 | Joshua D. Guttman |
Filtering Postures: Local Enforcement for Global Policies. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
filtering postures, global policy local enforcement, global network access control, optimal service, network topology, security policy, routers, authorisation, packet filtering, prototype implementation |
Displaying result #1 - #100 of 1302 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |