Sciweavers

127 search results - page 11 / 26
» Towards reasonability properties for access-control policy l...
Sort
View
CL
2010
Springer
13 years 7 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr
CSFW
2005
IEEE
14 years 1 months ago
Language-Based Information Erasure
Real computing systems sometimes need to forget sensitive information. This paper explores the specification and semantics of information erasure policies, which impose a strong,...
Stephen Chong, Andrew C. Myers
ICSE
2005
IEEE-ACM
14 years 7 months ago
Verifying safety policies with size properties and alias controls
Many software properties can be analysed through a relational size analysis on each function's inputs and outputs. Such relational analysis (through a form of dependent typin...
Wei-Ngan Chin, Siau-Cheng Khoo, Shengchao Qin, Cor...
GLOBECOM
2007
IEEE
14 years 1 months ago
Utilizing Semantic Tags for Policy Based Networking
Abstract— Policy based networks provide high levels of flexibility by allowing definition of packet handling rules within a network, resource allocation strategies, network man...
Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam ...
ICTAI
2009
IEEE
14 years 2 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu