Sciweavers

378 search results - page 35 / 76
» Programming with Explicit Security Policies
Sort
View
COMPSAC
2003
IEEE
14 years 27 days ago
A Security Characterisation Framework for Trustworthy Component Based Software Systems
This paper explores how to characterise security properties of software components, and how to reason about their suitability for a trustworthy compositional contract. Our framewo...
Khaled M. Khan, Jun Han
FAST
2009
13 years 5 months ago
Towards Semantics for Provenance Security
Provenance records the history of data. Careless use of provenance may violate the security policies of data. Moreover, the provenance itself may be sensitive information, necessi...
Stephen Chong
IFIP
2007
Springer
14 years 1 months ago
Cyber Security: Are Economic Incentives Adequate?
Protecting national critical infrastructure assets from cyber incidents is an important challenge. One facet of this challenge is that the vast majority of the owners and operators...
Scott Dynes, Eric Goetz, Michael Freeman
OOPSLA
2001
Springer
14 years 1 days ago
Modular Mixin-Based Inheritance for Application Frameworks
Mixin modules are proposed as an extension of a class-based programming language. Mixin modules combine parallel extension of classes, including extension of the self types for th...
Dominic Duggan, Ching-Ching Techaubol
TDSC
2008
152views more  TDSC 2008»
13 years 7 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...