Sciweavers

715 search results - page 89 / 143
» On Run-Time Enforcement of Policies
Sort
View
CONEXT
2009
ACM
13 years 8 months ago
Improving internet-wide routing protocols convergence with MRPC timers
The behavior of routing protocols during convergence is critical as it impacts end-to-end performance. Network convergence is particularly important in BGP, the current interdomai...
Anthony J. Lambert, Marc-Olivier Buob, Steve Uhlig
ESORICS
2009
Springer
14 years 8 months ago
Towards a Theory of Accountability and Audit
Accountability mechanisms, which rely on after-the-fact verification, are an attractive means to enforce authorization policies. In this paper, we describe an operational model of ...
Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, Jam...
PADL
2010
Springer
14 years 4 months ago
ActionScript In-Lined Reference Monitoring in Prolog
Abstract. A Prolog implementation of an In-lined Reference Monitoring system prototype for Adobe ActionScript Bytecode programs is presented. Prolog provides an elegant framework f...
Meera Sridhar, Kevin W. Hamlen
HICSS
2005
IEEE
124views Biometrics» more  HICSS 2005»
14 years 1 months ago
Bounded in Cyberspace: An Empirical Model of Self-Regulation in Virtual Communities
This article aims to focus on self-regulation mechanisms that are exercised by virtual communities in order to maintain their boundaries of autonomy while directing behavior of th...
Karine Barzilai-Nahon, Seev Neumann
FSTTCS
2005
Springer
14 years 1 months ago
Non-disclosure for Distributed Mobile Code
Abstract. This paper addresses the issue of confidentiality and declassification for global computing in a language-based security perspective. The purpose is to deal with new fo...
Ana Almeida Matos