Sciweavers

715 search results - page 64 / 143
» On Run-Time Enforcement of Policies
Sort
View
CSFW
2010
IEEE
13 years 11 months ago
Information Flow Monitor Inlining
In recent years it has been shown that dynamic monitoring can be used to soundly enforce information flow policies. For programs distributed in source or bytecode form, the use o...
Andrey Chudnov, David A. Naumann
SSWMC
2004
13 years 9 months ago
Collusion-resistant multimedia fingerprinting: a unified framework
Digital fingerprints are unique labels inserted in different copies of the same content before distribution. Each digital fingerprint is assigned to an intended recipient, and can...
Min Wu, Wade Trappe, Z. Jane Wang, K. J. Ray Liu
LISP
2002
81views more  LISP 2002»
13 years 7 months ago
Secure Information Flow via Linear Continuations
Security-typed languages enforce secrecy or integrity policies by type-checking. This paper investigates continuation-passing style (CPS) as a means of proving that such languages...
Steve Zdancewic, Andrew C. Myers
GLOBECOM
2007
IEEE
14 years 2 months ago
Exit Policy Violations in Multi-Hop Overlay Routes: Analysis and Mitigation
— The traffic exchanged between two overlay nodes in different autonomous systems (AS) is always subjected to a series of inter-domain policies. However, overlay routing often m...
Srinivasan Seetharaman, Mostafa H. Ammar
ICDCS
1998
IEEE
13 years 12 months ago
A Mechanism for Establishing Policies for Electronic Commerce
This paper introduces a mechanism for establishing policies for electronic commerce in a uni ed and secure manner. A commercial policy can be viewed as the embodiment of a contrac...
Naftaly H. Minsky, Victoria Ungureanu