Sciweavers

195 search results - page 16 / 39
» Composable Encapsulation Policies
Sort
View
CSFW
2005
IEEE
14 years 1 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook
CSFW
2000
IEEE
13 years 11 months ago
Secure Composition of Untrusted Code: Wrappers and Causality Types
We consider the problem of assembling concurrent software systems from untrusted or partially trusted o -the-shelf components, using wrapper programs to encapsulate components and...
Peter Sewell, Jan Vitek
APSEC
1995
IEEE
13 years 11 months ago
Development of Distributed Applications with Separation of Concerns
The development of distributed applications is an open area involving researchers from different communities. We propose an object-oriented approach to the development of distribu...
António Rito Silva, Pedro Sousa, José...
USENIX
2000
13 years 8 months ago
Pandora: A Flexible Network Monitoring Platform
This paper presents Pandora, a network monitoring platform that captures packets using purely passive techniques. Pandora addresses current needs for improving Internet middleware...
Simon Patarin, Mesaac Makpangou
RTSS
2007
IEEE
14 years 1 months ago
Integrating Adaptive Components: An Emerging Challenge in Performance-Adaptive Systems and a Server Farm Case-Study
The increased complexity of performance-sensitive software systems leads to increased use of automated adaptation policies in lieu of manual performance tuning. Composition of ada...
Jin Heo, Dan Henriksson, Xue Liu, Tarek F. Abdelza...