Sciweavers

136 search results - page 2 / 28
» Deriving Enforcement Mechanisms from Policies
Sort
View
ENTCS
2008
83views more  ENTCS 2008»
13 years 5 months ago
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies
State-of-the-art security mechanisms are often enforced in isolation from each other, which limits the kinds of policies that can be enforced in distributed and heterogeneous sett...
Tom Goovaerts, Bart De Win, Wouter Joosen
ECOOP
2004
Springer
13 years 10 months ago
Ownership Domains: Separating Aliasing Policy from Mechanism
Ownership types promise to provide a practical mechanism for enforcing stronger encapsulation by controlling aliasing in objectoriented languages. However, previous ownership type ...
Jonathan Aldrich, Craig Chambers
CCS
2009
ACM
14 years 1 days ago
A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms
We enforce information flow policies in programs that run at multiple locations, with diverse levels of security. We build a compiler from a small imperative language with locali...
Cédric Fournet, Gurvan Le Guernic, Tamara R...
USS
2010
13 years 3 months ago
AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements
Web publishers frequently integrate third-party advertisements into web pages that also contain sensitive publisher data and end-user personal data. This practice exposes sensitiv...
Mike Ter Louw, Karthik Thotta Ganesh, V. N. Venkat...
CCS
2009
ACM
14 years 5 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong