Sciweavers

1288 search results - page 99 / 258
» Securing aspect composition
Sort
View
CCS
2006
ACM
14 years 2 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
EUROSYS
2007
ACM
14 years 2 months ago
Adding dynamic reconfiguration support to JBoss AOP
The majority of aspect-oriented middlewares supporting dynamic aspect weaving fail to preserve important safety properties while weaving or unweaving a distributed aspect at runti...
Nico Janssens, Eddy Truyen, Frans Sanen, Wouter Jo...
ENTCS
2006
117views more  ENTCS 2006»
13 years 10 months ago
A Formalization of Credit and Responsibility Within the GNDC Schema
We formally define a notion of credit and responsibility within the Generalized Non Deducibility on Compositions framework. We investigate the validity of our definitions through ...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
ISCC
2006
IEEE
14 years 4 months ago
Security for the Mythical Air-Dropped Sensor Network
The research area of very large scale wireless sensor networks made of low-cost sensors is gaining a lot of interest as witnessed by the large number of published papers. The secu...
Chandana Gamage, Kemal Bicakci, Bruno Crispo, Andr...
ISSA
2008
13 years 11 months ago
Collective Improvisation: Complementing Information Security Frameworks with Self-Policing
The approach to information security governance has predominantly followed a functionalist paradigm with emphasis placed on formalized rule structures and policy frameworks. The a...
Kennedy Njenga, Irwin Brown