Sciweavers

43 search results - page 7 / 9
» Tight Enforcement of Information-Release Policies for Dynami...
Sort
View
EUROSEC
2009
ACM
14 years 17 days ago
QuanTM: a quantitative trust management system
Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities inv...
Andrew G. West, Adam J. Aviv, Jian Chang, Vinayak ...
ICFP
2010
ACM
13 years 6 months ago
Security-typed programming within dependently typed programming
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmers to express and enforce access control and information flow policies. Most of ...
Jamie Morgenstern, Daniel R. Licata
ICFP
2003
ACM
14 years 5 months ago
A static type system for JVM access control
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementat...
Tomoyuki Higuchi, Atsushi Ohori
CCR
2008
84views more  CCR 2008»
13 years 5 months ago
Modeling internet topology dynamics
Despite the large number of papers on network topology modeling and inference, there still exists ambiguity about the real nature of the Internet AS and router level topology. Whi...
Hamed Haddadi, Steve Uhlig, Andrew W. Moore, Richa...
PLDI
2009
ACM
14 years 17 days ago
Laminar: practical fine-grained decentralized information flow control
Decentralized information flow control (DIFC) is a promising model for writing programs with powerful, end-to-end security guarantees. Current DIFC systems that run on commodity ...
Indrajit Roy, Donald E. Porter, Michael D. Bond, K...