Sciweavers

45 search results - page 7 / 9
» Non-Interference in Constructive Authorization Logic
Sort
View
ECIS
2004
13 years 8 months ago
Electronic business models: five cases from five industries
The term business model has been used loosely several times for describing a company's strategies, revenue model, processes and overall business logic both by researchers and...
Aleksi Horsti, Jyrki Tolonen, Malin Brännback
POPL
1998
ACM
13 years 11 months ago
From System F to Typed Assembly Language
abstractions, such as closures, tuples, and user-defined abstract data types. The type system ensures that well-typed programs cannot violate these abstractions. In addition, the ...
J. Gregory Morrisett, David Walker, Karl Crary, Ne...
CCS
2007
ACM
14 years 1 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
TLDI
2005
ACM
151views Formal Methods» more  TLDI 2005»
14 years 27 days ago
Strict bidirectional type checking
Completely annotated lambda terms (such as are arrived at via the straightforward encodings of various types from System F) contain much redundant type information. Consequently, ...
Adam J. Chlipala, Leaf Petersen, Robert Harper
STOC
2001
ACM
123views Algorithms» more  STOC 2001»
14 years 7 months ago
On optimal slicing of parallel programs
Optimal program slicing determines for a statement S in a program whether or not S affects a specified set of statements, given that all conditionals in are interpreted as non-d...
Markus Müller-Olm, Helmut Seidl