Sciweavers

715 search results - page 109 / 143
» On Run-Time Enforcement of Policies
Sort
View
IFIPTM
2010
97views Management» more  IFIPTM 2010»
13 years 6 months ago
Securing Class Initialization
Abstract. Language-based information-flow security is concerned with specifying and enforcing security policies for information flow via language constructs. Although much progre...
Keiko Nakata, Andrei Sabelfeld
MASS
2010
110views Communications» more  MASS 2010»
13 years 5 months ago
SpartanRPC: Secure WSN middleware for cooperating domains
In this paper we describe SpartanRPC, a secure middleware technology for wireless sensor network (WSN) applications supporting cooperation between distinct protection domains. The ...
Peter C. Chapin, Christian Skalka
TRUST
2009
Springer
14 years 2 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...
FSEN
2009
Springer
14 years 2 months ago
Evolution Control in MDE Projects: Controlling Model and Code Co-evolution
The dream of Model Driven Engineering (MDE) is that Software Engineering activities should be performed only on models, but in practice a significant amount of programming is still...
Jacky Estublier, Thomas Leveque, Germán Veg...
SIGCOMM
2009
ACM
14 years 2 months ago
Apprehending joule thieves with cinder
Energy is the critical limiting resource to mobile computing devices. Correspondingly, an operating system must track, provision, and ration how applications consume energy. The e...
Stephen M. Rumble, Ryan Stutsman, Philip Levis, Da...