Sciweavers

4731 search results - page 147 / 947
» Securing Interactive Programs
Sort
View
ESORICS
2000
Springer
14 years 19 days ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
CCS
2008
ACM
13 years 11 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
USENIX
2001
13 years 10 months ago
Integrating Flexible Support for Security Policies into the Linux Operating System
The protection mechanisms of current mainstream operating systems are inadequate to support confidentiality and integrity requirements for end systems. Mandatory access control (M...
Peter Loscocco, Stephen Smalley
VL
1996
IEEE
117views Visual Languages» more  VL 1996»
14 years 1 months ago
Tactile Programming: A Unified Manipulation Paradigm Supporting Program Comprehension, Composition and Sharing
Although visual programming techniques have been used to lower the threshold of programming for end users, they are not sufficient for creating end user programming environments t...
Alexander Repenning, James Ambach
DBPL
2003
Springer
105views Database» more  DBPL 2003»
14 years 2 months ago
Integrating Database and Programming Language Constraints
Abstract. We examine the maintenance of data consistency in the presence of application-database interactions. Currently, a programmer must insert explicit checks to ensure that da...
Oded Shmueli, Mukund Raghavachari, Vivek Sarkar, R...