Search

Your search keyword '"SECURITY POLICY"' showing total 30 results

Search Constraints

Start Over You searched for: Descriptor "SECURITY POLICY" Remove constraint Descriptor: "SECURITY POLICY" Journal journal of computer security Remove constraint Journal: journal of computer security
30 results on '"SECURITY POLICY"'

Search Results

1. The boundedly rational employee: Security economics for behaviour intervention support in organizations1.

2. The boundedly rational employee: Security economics for behaviour intervention support in organizations1.

3. The boundedly rational employee

4. Context-aware security: Linguistic mechanisms and static analysis.

5. Formal verification of security properties in trust management policy.

6. Enforcing provisioning and authorization policy in the Antigone system.

7. Paragon – Practical programming with information flow control

8. The bi-objective workflow satisfiability problem and workflow resiliency1

9. Context-aware security: Linguistic mechanisms and static analysis

10. Probabilistic cost enforcement of security policies

11. Security analysis for temporal role based access control

12. Dynamic enforcement of knowledge-based security policies using probabilistic abstract interpretation

13. Iterative enforcement by suppression: Towards practical enforcement theories*

14. Management of security policy configuration using a Semantic Threat Graph approach

15. Analyzing uncertainty in TG protection graphs with TG/MC

16. Provably correct inline monitoring for multithreaded Java-like programs

17. Quantifying information flow with beliefs

18. Efficient security policy enforcement for the mobile environment

19. Security policy refinement and enforcement for the design of multi-level secure systems

20. A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures

21. Enforcing provisioning and authorization policy in the Antigone system

22. Enforcing Robust Declassification and Qualified Robustness

23. Programmable access control1

24. Secure composition of untrusted code: box π, wrappers, and causality types

25. Checking secure interactions of smart card applets: extended version1

26. Using reflection as a mechanism for enforcing security policies on compiled code

27. Verified formal security models for multiapplicative smart cards1

28. Theft of Information in the Take-Grant Protection Model

29. A State-based Approach to Noninterference

30. A High Assurance Window System Prototype1

Catalog

Books, media, physical & digital resources