Results 11 to 20 of about 7,372,576 (288)
Distributed security policy conformance [PDF]
Security policy conformance is a crucial issue in large-scale critical cyber-infrastructure. The complexity of these systems, insider attacks, and the possible speed of an attack on a system necessitate an automated approach to assure a basic level of protection.This paper presents Odessa, a resilient system for monitoring and validating compliance of ...
Montanari, Mirko +4 more
openaire +3 more sources
Addressing food and nutrition security in South Africa: A review of policy responses since 2002 [PDF]
Since 2002, a range of South African policies have attempted to address the disproportionate burden of food and nutrition insecurity on the population. Yet malnutrition among the poor has worsened.
Boatemaa, S., Drimie, S., Pereira, L.
core +1 more source
Automatic enforcement of expressive security policies using enclaves
Hardware-based enclave protection mechanisms, such as Intel's SGX, ARM's TrustZone, and Apple's Secure Enclave, can protect code and data from powerful low-level attackers.
Anitha Gollamudi, Stephen Chong
semanticscholar +1 more source
Formal Modelling of Data Integration Systems Security Policies
Data Integration Systems (DIS) are concerned with integrating data from multiple data sources to resolve user queries. Typically, organisations providing data sources specify security policies that impose stringent requirements on the collection ...
Fatimah Y. Akeel +4 more
semanticscholar +1 more source
A Formal Framework for Concrete Reputation Systems [PDF]
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions about interaction.
Krukow, K., Nielsen, M., Sassone, V.
core +2 more sources
On Quantitative Security Policies [PDF]
We introduce a formal framework to specify and enforce quantitative security policies. The framework consists of: (i) a stochastic process calculus to express the measurable space of computations in terms of Continuous Time Markov Chains; (ii) a stochastic modal logic (a variant of CSL) to represent the bound constraints on execution speed; (iii) two ...
DEGANO, PIERPAOLO +2 more
openaire +2 more sources
The Anatomy and Facets of Dynamic Policies
Information flow policies are often dynamic; the security concerns of a program will typically change during execution to reflect security-relevant events. A key challenge is how to best specify, and give proper meaning to, such dynamic policies. A large
Broberg, Niklas +2 more
core +1 more source
Immigration: Visa Security Policies [PDF]
[Excerpt] The report opens with an overview of visa issuance policy. It then explains the key provisions that guide the documentary requirements and approval/disapproval process. The section on consular screening procedures includes an analysis of trends
Wasem, Ruth Ellen
core +2 more sources
Developmental Disorders in Children Recently Diagnosed With Cancer
ABSTRACT Neurocognitive deficits in adult survivors of childhood cancer are well established, but less is known about developmental disorders (DD) arising shortly after cancer diagnosis. Using 2016–2019 linked Ohio cancer registry and Medicaid data, we compared DD among 324 children with cancer and 606,913 cancer‐free controls.
Jamie Shoag +5 more
wiley +1 more source
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments [PDF]
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies.
Asghar, Muhammad Rizwan +3 more
core +1 more source

