Sciweavers

378 search results - page 3 / 76
» Programming with Explicit Security Policies
Sort
View
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 5 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
PLDI
2006
ACM
13 years 11 months ago
A microkernel virtual machine: : building security with clear interfaces
In this paper we propose a novel microkernel-based virtual machine (µKVM), a new code-based security framework with a simple and declarative security architecture. The main desig...
Xiaoqi Lu, Scott F. Smith
ISSA
2004
13 years 7 months ago
A General Methodology For The Development Of An Effective Information Security Policy
In today's hi-tech world, conventional physical security methods are simply insufficient for the protection of an organisation's information assets. This is because of t...
Arvish Ramdeyal
OSDI
2006
ACM
14 years 5 months ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...