Sciweavers

52 search results - page 9 / 11
» CPU Resource Control for Mobile Programs
Sort
View
138
Voted
POPL
2000
ACM
15 years 8 months ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
132
Voted
AAAI
1992
15 years 4 months ago
Reactive Navigation through Rough Terrain: Experimental Results
This paper describes a series of experiments that were performed on the Rocky III robot.1 Rocky III is a small autonomous rover capable of navigating through rough outdoor terrain...
David P. Miller, Rajiv S. Desai, Erann Gat, Robert...
169
Voted
SACMAT
2009
ACM
15 years 10 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
144
Voted
ESORICS
2000
Springer
15 years 7 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
113
Voted
PERCOM
2004
ACM
16 years 3 months ago
PCOM - A Component System for Pervasive Computing
Applications in the Pervasive Computing domain are challenged by the dynamism in which their execution environment changes, e.g. due to user mobility. As a result, applications ha...
Christian Becker, Marcus Handte, Gregor Schiele, K...