Sciweavers

174 search results - page 6 / 35
» Enforcing Non-safety Security Policies with Program Monitors
Sort
View
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
14 years 9 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
TLDI
2010
ACM
190views Formal Methods» more  TLDI 2010»
14 years 5 months ago
Distributed programming with distributed authorization
We propose a programming language, called PCML5, for building distributed applications with distributed access control. Target applications include web-based systems in which prog...
Kumar Avijit, Anupam Datta, Robert Harper
CCS
2005
ACM
14 years 2 months ago
Control-flow integrity
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
Martín Abadi, Mihai Budiu, Úlfar Erl...
ESORICS
2000
Springer
14 years 8 days ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
UML
2005
Springer
14 years 2 months ago
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming
Many of today’s software applications require a high-level of security, defined by a detailed policy and attained via mechanisms such as role-based access control (RBAC), mandat...
Jaime A. Pavlich-Mariscal, Laurent Michel, Steven ...