Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with d...
Two implementations are given for Java’s stack-inspection accesscontrol policy. Each implementation is obtained by generating an inlined reference monitor (IRM) for a different...
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...