Sciweavers

1940 search results - page 3 / 388
» The Dynamic Logic of Permission
Sort
View
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
14 years 1 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
ESOP
2009
Springer
14 years 2 months ago
Deny-Guarantee Reasoning
Abstract. Rely-guarantee is a well-established approach to reasoning about concurrent programs that use parallel composition. However, parallel composition is not how concurrency i...
Mike Dodds, Xinyu Feng, Matthew J. Parkinson, Vikt...
IDEAS
2009
IEEE
104views Database» more  IDEAS 2009»
14 years 2 months ago
An organizational file permission management system using the cellular data system
In designing dynamic situations such as cyberworlds, we the Incrementally Modular Abstraction Hierarchy (IMAH) to be an appropriate mathematical background to model dynamically ch...
Toshio Kodama, Tosiyasu L. Kunii, Yoichi Seki
AOSD
2010
ACM
14 years 22 days ago
A permission system for secure AOP
The integration of third-party aspects into applications creates security challenges. Due to the intrusive impact of aspects, one cannot guarantee that the dynamic composition of ...
Wouter De Borger, Bart De Win, Bert Lagaisse, Wout...
ICSE
2009
IEEE-ACM
14 years 8 months ago
Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. W...
Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Ba...