نتایج جستجو برای: introductionsocial security policies

تعداد نتایج: 291286  

1999
Tom Johnsten Vijay V. Raghavan

In this paper, we investigate issues pertaining to the assessment of the impact of classification mining on database security. Specifically, the security threat presented by a category of classification mining algorithms that we refer to as decision-region based is analyzed. Providing safeguards against this threat requires, in part, the development of new security policies. Our specific contri...

2001
Steve Barker Arnon Rosenthal

We show how a wide variety of role-based access control policies may be formally specified in the stratified subset of clause form logic. We then show how these formal specifications may be automatically translated into a small subset of SQL to be used to seamlessly protect a relational database from unauthorized read and update requests made by authenticated users. We demonstrate the power of ...

2010
Jiwon Seo Monica S. Lam

Many modern software platforms today, including browsers, middle-ware server architectures, cell phone operating systems, web application engines, support third-party software extensions. This paper proposes InvisiType, an object-oriented approach that enables platform developers to efficiently enforce fine-grain safety checks on third-party extensions without requiring their cooperation. This ...

2013
Nayer A. Hamidi G. K. Mahdi Rahimi Alireza Nafarieh Ali Hamidi Bill Robertson

Personalized security in E-banking is an important issue for many individuals and companies that are looking for achieving the proper level of security. The cloud environment is a suitable infrastructure to implement personalized security mechanisms for many big companies such as banks. Employing mandatory access controls boosts the security of E-banking to a high level. Flask architecture is t...

1997
C Bidan V Issarny

In today's eld of distributed architectures there is a need for environments allowing the easy development of applications consisting of heterogeneous software modules and running on heterogeneous hardware platforms. From the security point of view, the challenge for such environments is to permit the interop-eration between applications specifying diierent, possibly inconsistent security polic...

1997
V. Issarny

In today's eld of distributed architectures there is a need for environments allowing the easy development of applications consisting of heterogeneous software modules and running on heterogeneous hardware platforms. From the security point of view, the challenge for such environments is to permit the interoperation between applications specifying di erent, possibly inconsistent security polici...

2007
Arjmand Samuel Ammar Masood Arif Ghafoor Aditya Mathur

With the increase in information accessibility, security and privacy of data is a key concern, underscoring the need for managing security of system resources and objects in an enterprise. One of the most popular access control management approaches is to abstract security administration tasks by employing system and security policies [1]. While policy based security management approach offers ...

1999
Carlos Ribeiro Paulo Guedes

Workflow applications for large complex organizations often need to cross several security domains, each with different management and specific security requirements. The resultant cross-dependency between the workflow specification and the security policy of each domain can be hard to manage without specific tools. This work presents a static analyzer that automatically verifies the consistenc...

Journal: :International Journal of Canadian Studies 2007

Journal: :SSRN Electronic Journal 2004

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید