Sciweavers

687 search results - page 78 / 138
» A Self-Policing Policy Language
Sort
View
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
14 years 3 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
ECOOP
2005
Springer
14 years 2 months ago
Sharing the Runtime Representation of Classes Across Class Loaders
One of the most distinctive features of the JavaT M programming language is the ability to specify class loading policies. Despite the popularity of class loaders, little has been ...
Laurent Daynès, Grzegorz Czajkowski
DBSEC
2009
130views Database» more  DBSEC 2009»
13 years 10 months ago
Implementing Reflective Access Control in SQL
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege in an access control ...
Lars E. Olson, Carl A. Gunter, William R. Cook, Ma...
POPL
2008
ACM
14 years 9 months ago
A theory of platform-dependent low-level software
The C language definition leaves the sizes and layouts of types partially unspecified. When a C program makes assumptions about type layout, its semantics is defined only on platf...
Marius Nita, Dan Grossman, Craig Chambers
EDBT
2002
ACM
112views Database» more  EDBT 2002»
14 years 9 months ago
Querying with Intrinsic Preferences
The handling of user preferences is becoming an increasingly important issue in present-day information systems. Among others, preferences are used for information filtering and ex...
Jan Chomicki