Sciweavers

174 search results - page 21 / 35
» Enforcing Non-safety Security Policies with Program Monitors
Sort
View
ENTCS
2002
90views more  ENTCS 2002»
13 years 7 months ago
Guardians for Ambient-based Monitoring
In the Mobile Ambients of Cardelli and Gordon an ambient is a unit for mobility, which may contain processes (data) and sub-ambients. Since the seminal work of Cardelli and Gordon...
Gian Luigi Ferrari, Eugenio Moggi, Rosario Puglies...
ECOOP
1999
Springer
13 years 11 months ago
Providing Fine-grained Access Control for Java Programs
There is considerable interest in programs that can migrate from one host to another and execute. Mobile programs are appealing because they support efficient utilization of networ...
Raju Pandey, Brant Hashii
HASKELL
2008
ACM
13 years 8 months ago
A library for light-weight information-flow security in haskell
Protecting confidentiality of data has become increasingly important for computing systems. Information-flow techniques have been developed over the years to achieve that purpos...
Alejandro Russo, Koen Claessen, John Hughes
JSS
2008
136views more  JSS 2008»
13 years 7 months ago
Specification, decomposition and agent synthesis for situation-aware service-based systems
Service-based systems are distributed computing systems with the major advantage of enabling rapid composition of distributed applications, such as collaborative research and deve...
Stephen S. Yau, Haishan Gong, Dazhi Huang, Wei Gao...
SACMAT
2005
ACM
14 years 1 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang