Sciweavers

174 search results - page 29 / 35
» Enforcing Non-safety Security Policies with Program Monitors
Sort
View
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
14 years 2 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
SOSP
2007
ACM
14 years 4 months ago
Information flow control for standard OS abstractions
ion Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek Eddie Kohler† Robert Morris MIT CSAIL †UCLA http://flum...
Maxwell N. Krohn, Alexander Yip, Micah Z. Brodsky,...
APLAS
2010
ACM
13 years 7 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
IFIP
2007
Springer
14 years 1 months ago
Securing Current and Future Process Control Systems
Process control systems (PCSs) are instrumental to the safe, reliable and efficient operation of many critical infrastructure components. However, PCSs increasingly employ commodit...
Robert K. Cunningham, Steven Cheung, Martin W. Fon...
COMAD
2009
13 years 8 months ago
When to Trigger Active Rules?
Active rules model and enforce enterprise requirements such as situation monitoring using events, conditions and actions. These rules are termed active rules as they make the unde...
Raman Adaikkalavan, Sharma Chakravarthy