In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Real computing systems sometimes need to forget sensitive information. This paper explores the specification and semantics of information erasure policies, which impose a strong,...
Many software properties can be analysed through a relational size analysis on each function's inputs and outputs. Such relational analysis (through a form of dependent typin...
Abstract— Policy based networks provide high levels of flexibility by allowing definition of packet handling rules within a network, resource allocation strategies, network man...
Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam ...
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...