Sciweavers

715 search results - page 2 / 143
» On Run-Time Enforcement of Policies
Sort
View
ICS
1997
Tsinghua U.
13 years 11 months ago
Compiler and Run-Time Support for Semi-Structured Applications
Adaptive mesh re nement (AMR) is a very important scienti c application. Several libraries implementing speci c distribution policies havebeen written for AMR. In this paper, we p...
Nikos Chrisochoides, Induprakas Kodukula, Keshav P...
OSDI
1996
ACM
13 years 8 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee
ESORICS
2009
Springer
14 years 8 months ago
PCAL: Language Support for Proof-Carrying Authorization Systems
By shifting the burden of proofs to the user, a proof-carrying authorization (PCA) system can automatically enforce complex access control policies. Unfortunately, managing those p...
Avik Chaudhuri, Deepak Garg
VECPAR
2000
Springer
13 years 11 months ago
A SCOOPP Evaluation on Packing Parallel Objects in Run-Time
The SCOOPP (Scalable Object Oriented Parallel Programming) system is an hybrid compile and run-time system. SCOOPP dynamically scales OO applications on a wide range of target plat...
João Luís Sobral, Alberto José...
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
14 years 1 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...