Aragorn: Eliciting and Maintaining Secure Service Policies

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Maintaining a Secure Network

Maintaining a secure network connected to the Internet is becoming more difficult as time goes on. New viruses are released daily, higher machine speeds and more sophisticated and automated tools mean that hackers can scan and attack wide sections of the Internet at a time. More consumer broadband connections mean that there is an increasing source of relatively vulnerable high performance comp...

متن کامل

Institutions and Policies for Maintaining Financial Stability

When journalists from other countries would ask me in the 1980s how the United States could suffer such embarrassingly large losses in its savings and loan, and later its banking, industry, I would be somewhat embarrassed myself, as an American citizen, trying to explain how things could go so wrong in such a developed country. A decade later, the tables seemed to have turned. Many countries ha...

متن کامل

Maintaining Secure and Reliable Distributed Control Systems

W consider the role of security in the maintenance of an automated system, controlled by a network of sensors and simple computing devices. Such systems are widely used in transportation, utilities, healthcare, and manufacturing. Devices in the network are subject to traditional failures that can lead to a larger system failure if not repaired. However, the devices are also subject to security ...

متن کامل

Eliciting Expert Advice in Service-Oriented Computing

We consider a setting where a consumer would like to elicit independent but costly reports from third-party experts about the reliability of a number of service providers. These reports can be of variable accuracy, but more accurate reports will be more costly to produce, and the consumer can fuse reports from several experts to choose the provider with the highest probability of success. We ex...

متن کامل

Mediating secure information flow policies

In this paper we study secure information flow policies in the sense of Meadows [12] and others for aggregated datasets, collectively. We first present a method for combining different sensitivity levels over a common dataset and investigate its ramifications on information flow policies. Next, safe-flow policies are formulated in full generality using domain-theoretic tools, and systematically...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer

سال: 2017

ISSN: 0018-9162

DOI: 10.1109/mc.2017.4451210