Results 11 to 20 of about 7,372,576 (288)

Distributed security policy conformance [PDF]

open access: yesComputers & Security, 2011
Security policy conformance is a crucial issue in large-scale critical cyber-infrastructure. The complexity of these systems, insider attacks, and the possible speed of an attack on a system necessitate an automated approach to assure a basic level of protection.This paper presents Odessa, a resilient system for monitoring and validating compliance of ...
Montanari, Mirko   +4 more
openaire   +3 more sources

Addressing food and nutrition security in South Africa: A review of policy responses since 2002 [PDF]

open access: yes, 2018
Since 2002, a range of South African policies have attempted to address the disproportionate burden of food and nutrition insecurity on the population. Yet malnutrition among the poor has worsened.
Boatemaa, S., Drimie, S., Pereira, L.
core   +1 more source

Automatic enforcement of expressive security policies using enclaves

open access: yesConference on Object-Oriented Programming Systems, Languages, and Applications, 2016
Hardware-based enclave protection mechanisms, such as Intel's SGX, ARM's TrustZone, and Apple's Secure Enclave, can protect code and data from powerful low-level attackers.
Anitha Gollamudi, Stephen Chong
semanticscholar   +1 more source

Formal Modelling of Data Integration Systems Security Policies

open access: yesData Science and Engineering, 2016
Data Integration Systems (DIS) are concerned with integrating data from multiple data sources to resolve user queries. Typically, organisations providing data sources specify security policies that impose stringent requirements on the collection ...
Fatimah Y. Akeel   +4 more
semanticscholar   +1 more source

A Formal Framework for Concrete Reputation Systems [PDF]

open access: yes, 2005
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions about interaction.
Krukow, K., Nielsen, M., Sassone, V.
core   +2 more sources

On Quantitative Security Policies [PDF]

open access: yes, 2011
We introduce a formal framework to specify and enforce quantitative security policies. The framework consists of: (i) a stochastic process calculus to express the measurable space of computations in terms of Continuous Time Markov Chains; (ii) a stochastic modal logic (a variant of CSL) to represent the bound constraints on execution speed; (iii) two ...
DEGANO, PIERPAOLO   +2 more
openaire   +2 more sources

The Anatomy and Facets of Dynamic Policies

open access: yes, 2015
Information flow policies are often dynamic; the security concerns of a program will typically change during execution to reflect security-relevant events. A key challenge is how to best specify, and give proper meaning to, such dynamic policies. A large
Broberg, Niklas   +2 more
core   +1 more source

Immigration: Visa Security Policies [PDF]

open access: yes, 2015
[Excerpt] The report opens with an overview of visa issuance policy. It then explains the key provisions that guide the documentary requirements and approval/disapproval process. The section on consular screening procedures includes an analysis of trends
Wasem, Ruth Ellen
core   +2 more sources

Developmental Disorders in Children Recently Diagnosed With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Neurocognitive deficits in adult survivors of childhood cancer are well established, but less is known about developmental disorders (DD) arising shortly after cancer diagnosis. Using 2016–2019 linked Ohio cancer registry and Medicaid data, we compared DD among 324 children with cancer and 606,913 cancer‐free controls.
Jamie Shoag   +5 more
wiley   +1 more source

ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments [PDF]

open access: yes, 2013
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies.
Asghar, Muhammad Rizwan   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy