… A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting … presents security policies for downgrading and a security type system …
ccs 2004: 198-209 [doi]… , but in both, the private and business sector, users are often not aware of security issues or lack proper security skills. The branch of information technology security … is the weakest link of the security chain we aim to raise awareness, regarding …
IEEEares 2007: 730-740 [doi]… This paper presents a framework and a tool for quantifying the security … a finite amount of resources with which to discover faults in the network security … of the operation of the human immune system are explored. Network security actions may be taken …
Technical Report 98CRD028, 1998.… This paper presents a framework and a tool for quantifying the security … a finite amount of resources with which to discover faults in the network security … of the operation of the human immune system are explored. Network security actions may be taken …
Technical Report 98CRD028, 1998.… of ISO/IEC 27001 audits, and to strengthen the security state of the company respectively. Building on extensive previous work on security ontologies, we … introduction to security ontologies is given first. Specific examples show how …
prdc 2007: 381-388 [doi]… and testing security policies in Java applications. First, a security policy …). It is based on a generic security meta-model which can be used for early consistency checks in the security policy. This model is then automatically transformed …
MoDELS 2008: 537-552 [doi]… be declassified. While security definitions for declassification exist … no compositional security definition exists for intensional information-flow … parts of a program. We use logical relations to build a model (and thus security …
Proc. ACM Program. Lang., 7(OOPSLA1), apr 2023. [doi]… . Therefore, numerous publications on RFID security appear every year, adding … literature and present our observations on privacy and security in RFID. …
iiwas 2007: 213-222… and validation, and automatic of security 2.1 - Standard RBAC standard was proposed by alities required by - systems …
\ldots 12th ACM symposium on Access control models and technologies, , Jan 2007.… We consider the problem of specifying and verifying cryptographic security protocols for XML web services. The security specification WS-Security describes a range of XML security tokens, such as username tokens, public-key certificates …
POPL 2004: 198-209 [doi]… of functionality; programming principles require least authority for the sake of security. If we practice our principles, we could have both security and functionality. Treating security as a separate concern has not succeeded in bridging the gap between …
moz 2005: 2-20 [doi]… security increases exponentially. We can no longer afford to tolerate relatively simple security problems like those presented in the OWASP Top 10.
The goal of the Top 10 project is to raise awarenessabout application security …
Technical Report 2010.… architectures have been proposed, but lack appropriate security mechanisms to protect … for the primary and secondary usage of health data and give insights on the security …
IEEEares 2008: 39-46 [doi]… In 1973, John Reynold’s and James Morris’ Gedanken language retrofit object-capability security into an Algol-like base. Today, there are active projects retrofitting Java, Javascript, Python, Mozart/Oz, OCaml, Perl, and Pict …
DLS 2007: 1 [doi]… Illegal cyberspace activities are increasing rapidly and many software engineers are using reverse engineering methods to respond to attacks. The security … study done in a security context at a research and development government …
In Proceedings of the 18th Working Conference on Reverse Engineering. 2011: 184-188 [doi]