Sciweavers

23 search results - page 4 / 5
» Extending Operational Semantics of the Java Bytecode
Sort
View
COOTS
2001
13 years 7 months ago
Kava - Using Byte code Rewriting to add Behavioural Reflection to Java
Many authors have proposed using byte code rewriting as a way of adapting or extending the behaviour of Java There are toolkits available that simplify this process and raise the ...
Ian Welch, Robert J. Stroud
PLDI
2009
ACM
14 years 17 days ago
On PDG-based noninterference and its modular proof
We present the first machine-checked correctness proof for information flow control (IFC) based on program dependence graphs (PDGs). IFC based on slicing and PDGs is flow-sensi...
Daniel Wasserrab, Denis Lohner, Gregor Snelting
JCS
2010
124views more  JCS 2010»
13 years 4 months ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...
LREC
2008
114views Education» more  LREC 2008»
13 years 7 months ago
A Bottom-up Comparative Study of EuroWordNet and WordNet 3.0 Lexical and Semantic Relations
The paper presents a comparative study of semantic and lexical relations defined and adopted in WordNet and EuroWordNet. This document describes the experimental observations achi...
Maria Teresa Pazienza, Armando Stellato, Alexandra...
CCS
2009
ACM
14 years 6 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong