Sciweavers

325 search results - page 43 / 65
» Secure safe ambients
Sort
View
CSFW
1995
IEEE
13 years 11 months ago
Implementation of a discretionary access control model for script-based systems
Powerful applications can be implemented using command scripts. A command script is a program written by one user, called a writer, and made available to another user, called the ...
Trent Jaeger, Atul Prakash
CCS
2010
ACM
13 years 5 months ago
Adjustable autonomy for cross-domain entitlement decisions
Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially...
Jacob Beal, Jonathan Webb, Michael Atighetchi
FPL
2006
Springer
140views Hardware» more  FPL 2006»
13 years 11 months ago
A Thermal Management and Profiling Method for Reconfigurable Hardware Applications
Given large circuit sizes, high clock frequencies, and possibly extreme operating environments, Field Programmable Gate Arrays (FPGAs) are capable of heating beyond their designed...
Phillip H. Jones, John W. Lockwood, Young H. Cho
CCS
2011
ACM
12 years 7 months ago
Fortifying web-based applications automatically
Browser designers create security mechanisms to help web developers protect web applications, but web developers are usually slow to use these features in web-based applications (...
Shuo Tang, Nathan Dautenhahn, Samuel T. King
ESORICS
2009
Springer
14 years 8 months ago
Isolating JavaScript with Filters, Rewriting, and Wrappers
Abstract. We study methods that allow web sites to safely combine JavaScript from untrusted sources. If implemented properly, filters can prevent dangerous code from loading into t...
Sergio Maffeis, John C. Mitchell, Ankur Taly