Sciweavers

365 search results - page 52 / 73
» Types for Safe Locking
Sort
View
OOPSLA
1992
Springer
14 years 1 months ago
CACL: Efficient Fine-Grained Protection for Objects
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
14 years 20 days ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
ESOP
2006
Springer
14 years 18 days ago
Linear Regions Are All You Need
Abstract. The type-and-effects system of the Tofte-Talpin region calculus makes it possible to safely reclaim objects without a garbage collector. However, it requires that regions...
Matthew Fluet, Greg Morrisett, Amal J. Ahmed
C++
1992
83views more  C++ 1992»
13 years 10 months ago
Adding Concurrency to a Programming Language
A programming language that lacks facilities for concurrent programming can gain those facilities in two ways: the language can be extended with additional constructs, which will ...
Peter A. Buhr, G. Ditchfeld
CORR
2010
Springer
61views Education» more  CORR 2010»
13 years 9 months ago
Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information?
Abstract-- The problem of private information "leakage" (inadvertently or by malicious design) from the myriad large centralized searchable data repositories drives the n...
Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poo...