Sciweavers

576 search results - page 52 / 116
» Implementing a secure setuid program
Sort
View
SP
1999
IEEE
126views Security Privacy» more  SP 1999»
14 years 1 months ago
Flexible Policy-Directed Code Safety
This work introduces a new approach to code safety. We present Naccio, a system architecture that allows a large class of safety policies to be expressed in a general and platform...
David Evans, Andrew Twyman
AGENTS
1997
Springer
14 years 1 months ago
Real-Time Control of Attention and Behavior in a Logical Framework
We describe a uniform technique for representing both sensory data and the attentional state of an agent using a subset of modal logic with indexicals. The resulting representatio...
Ian Horswill
OOPSLA
1992
Springer
14 years 1 months ago
Concurrency Annotations
JAC is a Java extension for high-level concurrent programming, meant to hide the notions of threads and synchronization statements from the programmer. Putting into practice the c...
Klaus-Peter Löhr
ESORICS
2006
Springer
14 years 1 months ago
Discretionary Capability Confinement
Motivated by the need of application-level access control in dynamically extensible systems, this work proposes a static annotation system for modeling capabilies in a Java-like pr...
Philip W. L. Fong
ACNS
2009
Springer
123views Cryptology» more  ACNS 2009»
14 years 4 months ago
Practical Secure Evaluation of Semi-private Functions
Abstract. Two-party Secure Function Evaluation (SFE) is a very useful cryptographic tool which allows two parties to evaluate a function known to both parties on their private (sec...
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider