Sciweavers

1076 search results - page 167 / 216
» Operations on proofs and labels
Sort
View
ICFP
2008
ACM
14 years 8 months ago
AURA: a programming language for authorization and audit
This paper presents AURA, a programming language for access control that treats ordinary programming constructs (e.g., integers and recursive functions) and authorization logic co...
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianz...
ICFP
2008
ACM
14 years 8 months ago
Typed closure conversion preserves observational equivalence
Language-based security relies on the assumption that all potential attacks are bound by the rules of the language in question. When programs are compiled into a different languag...
Amal Ahmed, Matthias Blume
PERCOM
2005
ACM
14 years 8 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
MOBIHOC
2008
ACM
14 years 8 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao
EWSN
2004
Springer
14 years 8 months ago
Prototyping Wireless Sensor Network Applications with BTnodes
We present a hardware and software platform for rapid prototyping of augmented sensor network systems, which may be temporarily connected to a backend infrastructure for data stora...
Frank Siegemund, Friedemann Mattern, Jan Beutel, K...