Sciweavers

379 search results - page 3 / 76
» The Need for Declarative Security Mechanisms
Sort
View
ICLP
2003
Springer
13 years 11 months ago
Flow Java: Declarative Concurrency for Java
Abstract. Logic variables pioneered by (concurrent) logic and concurrent constraint programming are powerful mechanisms for automatically synchronizing concurrent computations. The...
Frej Drejhammar, Christian Schulte, Per Brand, Sei...
ATAL
2004
Springer
13 years 11 months ago
Brain Meets Brawn: Why Grid and Agents Need Each Other
The Grid and agent communities both develop concepts and mechanisms for open distributed systems, albeit from different perspectives. The Grid community has historically focused o...
Ian T. Foster, Nicholas R. Jennings, Carl Kesselma...
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 5 days ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
TACAS
1999
Springer
81views Algorithms» more  TACAS 1999»
13 years 10 months ago
Process Algebra in PVS
The aim of this work is to investigate mechanical support for process algebra, both for concrete applications and theoretical properties. Two approaches are presented using the ver...
Twan Basten, Jozef Hooman
ESORICS
2000
Springer
13 years 9 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud