Filters








27 Hits in 7.2 sec

Usage Control Policy Enforcement in OpenOffice.org and Information Flow

Christian Schaefer, Thomas Walter, Matús Harvan, Alexander Pretschner
2009 Information Security for South Africa  
This paper describes how usage control policies can be enforced in OpenOffice.org using the component technology UNO (Universal Network Objects) provided by OpenOffice.org.  ...  To control the data handling enforcement mechanisms have to be in place where the data is being used. These enforcement mechanisms can be implemented on different layers of the system.  ...  USAGE CONTROL POLICY ENFORCEMENT IN OPENOFFICE.ORG AND INFORMATION FLOW 1 INTRODUCTION In companies it is common to have a policy describing how sensitive information is to be used (sometimes referred  ... 
dblp:conf/issa/SchaeferWHP09 fatcat:cvycgtu3wbg7lpufm6kcarh73u

Audit and Change Analysis of Spreadsheets

John C. Nash, Neil Smith, Andy Adler
2008 arXiv   pre-print
Because spreadsheets have a large and growing importance in real-world work, their contents need to be controlled and validated.  ...  Spreadsheet applications with multiple authors are especially difficult to verify, since controls over access are difficult to enforce.  ...  A spreadsheet program on the server is used to manipulate the spreadsheet, and access controls limit manipulation of the spreadsheet to this program. Figure 3 illustrates the flow of information.  ... 
arXiv:0807.3168v1 fatcat:pvdfep4cxjax3ma5drpaogi4im

DRMFS: A file system layer for transparent access semantics of DRM-protected contents

Sangho Lee, Hay-Rim Lee, Seungkwang Lee, Jong Kim
2012 Journal of Systems and Software  
In this paper, we propose a DRM control scheme at the file system layer (DRMFS) that achieves transparent access semantics of DRM-protected contents with efficiency, applicability, and portability.  ...  Some previous schemes achieve limited transparent access semantics but have efficiency and applicability problems.  ...  We have explained in depth how our system is designed and implemented. We have also evaluated our implementation and confirmed that it has an acceptable overhead.  ... 
doi:10.1016/j.jss.2011.12.008 fatcat:ohhvy4y4ezbgfcimlcofaeltgi

An empirical study of software reliability in SDN controllers

Petra Vizarreta, Kishor Trivedi, Bjarne Helvik, Poul Heegaard, Wolfgang Kellerer, Carmen Mas Machuca
2017 2017 13th International Conference on Network and Service Management (CNSM)  
Software Defined Networking (SDN) exposes critical networking decisions, such as traffic routing or enforcement of the critical security policies, to a software entity known as the SDN controller.  ...  In this paper we analyze ten releases of ONOS open source controller, whose uncensored fault reports are available online.  ...  services protecting end-user applications from disaster-based failures (RECODIS) and was supported in part by US NSF Grant number CNS-1523994.  ... 
doi:10.23919/cnsm.2017.8256002 dblp:conf/cnsm/VizarretaTHHKM17 fatcat:wsycvuuv5ng6rihkdslxedmwcu

Why the Right to Data Portability Likely Reduces Consumer Welfare: Antitrust and Privacy Critique

Peter P. Swire, Yianni Lagos
2013 Social Science Research Network  
of data portability is legitimately open to factual and policy debates that inform "the ordinary legislative procedure." 217 Efforts to understand the new proposed RDP, and critique it where necessary  ...  the definition of "other information." 73 On the other end, companies keep many kinds of metadata and analytics about usage of a website, some of which is aggregated to the point where there is no feasible  ...  In a final Regulation or subsequent Commission actions, we hope the competition and privacy critique provided here can inform decisions about how to foster the best possible information economy, for the  ... 
doi:10.2139/ssrn.2159157 fatcat:i2sqygpnnfc4nfyqccue42admi

Scalable trust establishment with software reputation

Sven Bugiel, Lucas Vincenco Davi, Steffen Schulz
2011 Proceedings of the sixth ACM workshop on Scalable trusted computing - STC '11  
We implement our approach for the popular Debian GNU/Linux system, using publicly available information from open-source repositories and vulnerability databases.  ...  However, in practice this is often too expensive and time consuming: When a user decides between two alternative software solutions or a verifier should assess the security of a complete software system  ...  The assumption appears reasonable considering the lack of strong isolation and information flow control in commodity computer systems.  ... 
doi:10.1145/2046582.2046587 dblp:conf/ccs/BugielD011 fatcat:znox37ei3rb5pnzvz3fnegctee

Parallel Iterator for Parallelizing Object-Oriented Applications

Nasser Giacaman, Oliver Sinnen
2010 International journal of parallel programming  
A large portion of the computational load in a program rests within iterative computations.  ...  In object-oriented languages these are commonly handled using iterators which are inadequate for parallel programming.  ...  In particular for interactive desktop applications involving heavy disk usage, controlling the thread count is important.  ... 
doi:10.1007/s10766-010-0150-5 fatcat:egqx33etrjftvgcd7mlcv27dvq

Teaching IS to the Information Society using an "Informing Science" Perspective

Ramesh Subramanian, Bruce White
2012 Informing Science  
to inform managers, employees, and individuals about the Information Society in which they are all participants.  ...  We examine the concept of the Information Society in greater detail in the next section, but argue that the notion of the Information Society -one which permeates all aspects of society -has, in turn,  ...  These are listed in OpenOffice.org's Bibliographic/Software and Standards Information web page (OpenOffice.org, 2010).  ... 
doi:10.28945/1594 fatcat:kvzrwz2udre23ovfpi3k4zshby

Safeguarding EU Policy Aims and Requirements in Smart Grid Standardization

Robin Hoenkamp
2015 Social Science Research Network  
interface for usage information.  ...  In this report the basic functionalities are presented: determining and saving real-time usage, remote and local reading of usage, and the functionality to remote limitation or shut down of energy usage  ...  De cruciale rol van standaarden in de samenleving komt aan de orde.  ... 
doi:10.2139/ssrn.2607215 fatcat:xll7zk466nahjlwifjaolcdbla

A Comprehensive Review and Synthesis of Open Source Research

Altay Aksulu, Michael Wade
2010 Journal of the AIS  
The open source movement has grown steadily and matured in recent years, and this growth has been mirrored by a rise in open source related research.  ...  Elements of this taxonomy are defined and described.  ...  Implications for commercial firms aiming to use OSS in hybrid form are discussed. Some articles in this category investigate the role of collaborative business networks in OSS implementation.  ... 
doi:10.17705/1jais.00245 fatcat:47huhi4bfbfxfjilnk4mjxoj3i

Lexikos 16

Lexikos Lexikos
2012 Lexikos  
Mojela and his team for Sesotho sa Leboa (Data © 2004(Data © -2006, Sarah Hillewaert and her team for Swahili (Data © 2004(Data © -2006, Ngo S. Kabuta and his team for Cilubà (Data ©  ...  The work on this dictionary has since been transferred to Pitta Joffe and David Joffe, and the continued development is currently sponsored by TshwaneDJe HLT.  ...  in article 3 compared to the sinuous flowing in article 2.  ... 
doi:10.5788/16-0-675 fatcat:cx2tdu7g25atzpqs7n62tgg4h4

DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT A: ECONOMIC AND SCIENTIFIC POLICY Data Flows-Future Scenarios IN-DEPTH ANALYSIS

Colin Blackman, Laurent Hamers
unpublished
Prepared by Policy Department A at the request of the European Parliament's Committee on Industry, Research and Energy (ITRE), this report examines the current state of play in the open data market and  ...  Barriers and possible solutions are identified in the form of future scenarios to 2020-25.  ...  Competition Policy and Open Data Flows Does Control over Data Breed Data Monopolies?  ... 
fatcat:e7d4w5ualfdafaztqnke56vfcm

Who Should Read This Book [chapter]

2016 Securing the Outdoor Construction Site  
This approach was the polar opposite of that taken by the Macintosh and Windows commercial products, which enforced particular look-and-feel policies by designing them right into the system.  ...  User-specific configuration information is often carried in a hidden run control file in the user's home directory.  ...  From these choices many good things flowed.  ... 
doi:10.1016/b978-0-12-802383-9.00019-8 fatcat:5cxlhe2k4fbjzfwouwq6qa7iqe

The Information Society, a Challenge for Business Students? [chapter]

Viktorija Florjančič
2015 Communications in Computer and Information Science  
Tunisia, and the UK.  ...  We would like to thank our authors, reviewers, and Program Committee for their contributions and the University of Maribor, Slovenia, for hosting the conference.  ...  In this case, visual pleasantness and concentration are basically improved although the manual controlling method causes inconvenience to most users and disturbs the general flow of classes.  ... 
doi:10.1007/978-3-319-22629-3_14 fatcat:nd3afvjdrzgxxiuwx7zwsfnhwm

A Reference Model for Free/Open Source Software (F/OSS) process management

Michel Pawlak, Dimitri Konstantas
2007
Every F/OSS content must respect usage policies defined by the license that is associated with it.  ...  FLOSS project [54] provided interesting results through surveys concerning the use of F/OSS in firms and public administrations, the motivations and policy implications of such use, as well as on the policy  ...  In a third phase, we draw information zones -represented by colors in the graph -that identify the concepts that are closely related based on the information flows and roles appearing in the zone.  ... 
doi:10.13097/archive-ouverte/unige:9828 fatcat:ggt5n64msbexfb5adyuvwrngtq
« Previous Showing results 1 — 15 out of 27 results