Sciweavers

378 search results - page 49 / 76
» Programming with Explicit Security Policies
Sort
View
JCM
2008
75views more  JCM 2008»
13 years 7 months ago
A Secure Mobile Agents Platform
Abstract--Mobile Agents is a new paradigm for distributed computing where security is very essential to the acceptance of this paradigm in a large scale distributed environment. In...
Leila Ismail
CASSIS
2004
Springer
14 years 1 months ago
History-Based Access Control and Secure Information Flow
Abstract. This paper addresses the problem of static checking of programs to ensure that they satisfy confidentiality policies in the presence of dynamic access control in the for...
Anindya Banerjee, David A. Naumann
OOPSLA
2010
Springer
13 years 6 months ago
Tribal ownership
Tribal Ownership unifies class nesting and object ownership. Tribal Ownership is based on Tribe, a language with nested classes and object families. In Tribal Ownership, a progra...
Nicholas R. Cameron, James Noble, Tobias Wrigstad
CISIS
2010
IEEE
14 years 2 months ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...
SIGCOMM
2003
ACM
14 years 26 days ago
A high-level programming environment for packet trace anonymization and transformation
Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive...
Ruoming Pang, Vern Paxson