Sciweavers

715 search results - page 19 / 143
» On Run-Time Enforcement of Policies
Sort
View
AINA
2007
IEEE
14 years 1 months ago
Enforcing Fine-Grained Authorization Policies for Java Mobile Agents
The Mobile Agent (MA) paradigm advocates the migration of agent code to achieve computational goals. MAs require an executable environment on hosts where mobile code can be execut...
Giovanni Russello, Changyu Dong, Naranker Dulay
ACISP
2008
Springer
14 years 1 months ago
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy
The standard solution for mutual authentication between human users and servers on the Internet is to execute a TLS handshake during which the server authenticates using a X.509 ce...
Sebastian Gajek, Mark Manulis, Jörg Schwenk
ICDCS
2006
IEEE
14 years 1 months ago
Sharing Memory between Byzantine Processes using Policy-Enforced Tuple Spaces
Despite the large amount of Byzantine fault-tolerant algorithms for message-passing systems designed through the years, only recently algorithms for the coordination of processes ...
Alysson Neves Bessani, Joni da Silva Fraga, Miguel...
ICDE
2005
IEEE
137views Database» more  ICDE 2005»
14 years 9 months ago
Extending Relational Database Systems to Automatically Enforce Privacy Policies
Databases are at the core of successful businesses. Due to the voluminous stores of personal data being held by companies today, preserving privacy has become a crucial requiremen...
Rakesh Agrawal, Paul Bird, Tyrone Grandison, Jerry...