Sciweavers

2486 search results - page 58 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
LOPSTR
2004
Springer
14 years 2 months ago
Determinacy Analysis for Logic Programs Using Mode and Type Information
We propose an analysis for detecting procedures and goals that are deterministic (i.e. that produce at most one solution), or predicates whose clause tests are mutually exclusive (...
Pedro López-García, Francisco Bueno,...
DANCE
2002
IEEE
14 years 1 months ago
Developing Dynamic Security Policies
In this paper we define and provide a general construction for a class of policies we call dynamic policies. In most existing systems, policies are implemented and enforced by ch...
Prasad Naldurg, Roy H. Campbell, M. Dennis Mickuna...
OSDI
2008
ACM
14 years 9 months ago
Hardware Enforcement of Application Security Policies Using Tagged Memory
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware pag...
Nickolai Zeldovich, Hari Kannan, Michael Dalton, C...
APNOMS
2006
Springer
14 years 14 days ago
Experiences in End-to-End Performance Monitoring on KOREN
As the network technology has been developed, the Next Generation Internet (NGI) such as Internet2, KOREN, KREONET2 and etc has been deployed to support bandwidth of Giga bps. And,...
Wang-Cheol Song, Deok-Jae Choi
JIIS
2007
92views more  JIIS 2007»
13 years 8 months ago
Information ecology: open system environment for data, memories, and knowing
An information ecology provides a conceptual framework to consider data, the creation of knowledge, and the flow of information within a multidimensional context. This paper, repor...
Karen S. Baker, Geoffrey C. Bowker