Aragorn: Eliciting and Maintaining Secure Service Policies
نویسندگان
چکیده
منابع مشابه
Maintaining a Secure Network
Maintaining a secure network connected to the Internet is becoming more difficult as time goes on. New viruses are released daily, higher machine speeds and more sophisticated and automated tools mean that hackers can scan and attack wide sections of the Internet at a time. More consumer broadband connections mean that there is an increasing source of relatively vulnerable high performance comp...
متن کاملInstitutions and Policies for Maintaining Financial Stability
When journalists from other countries would ask me in the 1980s how the United States could suffer such embarrassingly large losses in its savings and loan, and later its banking, industry, I would be somewhat embarrassed myself, as an American citizen, trying to explain how things could go so wrong in such a developed country. A decade later, the tables seemed to have turned. Many countries ha...
متن کاملMaintaining Secure and Reliable Distributed Control Systems
W consider the role of security in the maintenance of an automated system, controlled by a network of sensors and simple computing devices. Such systems are widely used in transportation, utilities, healthcare, and manufacturing. Devices in the network are subject to traditional failures that can lead to a larger system failure if not repaired. However, the devices are also subject to security ...
متن کاملEliciting Expert Advice in Service-Oriented Computing
We consider a setting where a consumer would like to elicit independent but costly reports from third-party experts about the reliability of a number of service providers. These reports can be of variable accuracy, but more accurate reports will be more costly to produce, and the consumer can fuse reports from several experts to choose the provider with the highest probability of success. We ex...
متن کاملMediating secure information flow policies
In this paper we study secure information flow policies in the sense of Meadows [12] and others for aggregated datasets, collectively. We first present a method for combining different sensitivity levels over a common dataset and investigate its ramifications on information flow policies. Next, safe-flow policies are formulated in full generality using domain-theoretic tools, and systematically...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer
سال: 2017
ISSN: 0018-9162
DOI: 10.1109/mc.2017.4451210