Sciweavers

27 search results - page 4 / 6
» Checking ownership and confinement
Sort
View
SEFM
2005
IEEE
14 years 1 months ago
Safe Concurrency for Aggregate Objects with Invariants
Developing safe multithreaded software systems is difficult due to the potential unwanted interference among concurrent threads. This paper presents a flexible methodology for o...
Bart Jacobs 0002, Frank Piessens, K. Rustan M. Lei...
OOPSLA
1992
Springer
13 years 11 months ago
CACL: Efficient Fine-Grained Protection for Objects
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...
ENTCS
2002
78views more  ENTCS 2002»
13 years 7 months ago
Separating concerns in a high-level component-based context
Building on the work of architectural description languages and aspect-oriented programming, we try to improve current visual component composition environments. In our , we intro...
Wim Vanderperren, Bart Wydaeghe
USS
2010
13 years 5 months ago
Making Linux Protection Mechanisms Egalitarian with UserFS
UserFS provides egalitarian OS protection mechanisms in Linux. UserFS allows any user--not just the system administrator--to allocate Unix user IDs, to use chroot, and to set up f...
Taesoo Kim, Nickolai Zeldovich
CSE
2009
IEEE
14 years 2 months ago
Security and Trust through Electronic Social Network-Based Interactions
—The success of a Public Key Infrastructure such as the Web of Trust (WoT) heavily depends on its ability to ensure that public keys are used by their legitimate owners, thereby ...
Patrik Bichsel, Samuel Müller, Franz-Stefan P...