Sciweavers

715 search results - page 82 / 143
» On Run-Time Enforcement of Policies
Sort
View
IJCAI
2003
13 years 9 months ago
Use of Off-line Dynamic Programming for Efficient Image Interpretation
An interpretation system finds the likely mappings from portions of an image to real-world objects. An interpretation policy specifies when to apply which imaging operator, to whi...
Ramana Isukapalli, Russell Greiner
CSFW
2000
IEEE
14 years 3 days ago
Secure Composition of Untrusted Code: Wrappers and Causality Types
We consider the problem of assembling concurrent software systems from untrusted or partially trusted o -the-shelf components, using wrapper programs to encapsulate components and...
Peter Sewell, Jan Vitek
MOBICOM
1997
ACM
13 years 12 months ago
A Protection Scheme for Mobile Agents on Java
: This paper describes a protection scheme for mobile agents implemented on a Java environment. In this scheme, access to objects is controlled by means of software capabilities th...
Daniel Hagimont, Leila Ismail
EUROSSC
2006
Springer
13 years 11 months ago
Context-Aware Trust Domains
Context-aware service platforms need to establish and manage trust relationships for users to know if the user's privacy policies are being enforced and for service providers ...
Ricardo Neisse, Maarten Wegdam, Marten van Sindere...
ICISS
2010
Springer
13 years 5 months ago
Unifying Facets of Information Integrity
Abstract. Information integrity is a vital security property in a variety of applications. However, there is more than one facet to integrity: interpretations of integrity in diffe...
Arnar Birgisson, Alejandro Russo, Andrei Sabelfeld