Sciweavers

309 search results - page 40 / 62
» A Type System for Expressive Security Policies
Sort
View
ENTCS
2007
168views more  ENTCS 2007»
13 years 7 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...
NDSS
1997
IEEE
13 years 12 months ago
Hierarchical Organization of Certification Authorities for Secure Environments
This paper presents a model of hierarchical organization of Certification Authorities which can be applied to any open system network. In order to study the feasibility of the pro...
Lourdes López Santidrián, Justo Carr...
CSE
2009
IEEE
14 years 2 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
POPL
2000
ACM
14 years 20 hour ago
Enforcing Trace Properties by Program Transformation
We propose an automatic method to enforce trace properties on programs. The programmer specifies the property separately from the program; a program transformer takes the program...
Thomas Colcombet, Pascal Fradet
SP
2002
IEEE
200views Security Privacy» more  SP 2002»
13 years 7 months ago
Design of a Role-Based Trust-Management Framework
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths o...
Ninghui Li, John C. Mitchell, William H. Winsborou...