Sciweavers

329 search results - page 14 / 66
» A Theory of Secure Control Flow
Sort
View
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
15 years 1 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
SACMAT
2009
ACM
15 years 4 months ago
Access control policy combining: theory meets practice
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa B...
CDC
2010
IEEE
124views Control Systems» more  CDC 2010»
14 years 4 months ago
Underactuated control and distribution of multi-agent systems in stratified flow environments
The present paper shows how vertical actuation alone may be used to effectively control the spatial distribution of mobile vehicles ("balloons" in air, or "drifters&...
Robert H. Krohn, Thomas R. Bewley
IANDC
2008
140views more  IANDC 2008»
14 years 9 months ago
Information flow security in Boundary Ambients
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multi-level security policies. Ambients that may guarantee to proper...
Chiara Braghin, Agostino Cortesi, Riccardo Focardi
LISP
2002
81views more  LISP 2002»
14 years 9 months ago
Secure Information Flow via Linear Continuations
Security-typed languages enforce secrecy or integrity policies by type-checking. This paper investigates continuation-passing style (CPS) as a means of proving that such languages...
Steve Zdancewic, Andrew C. Myers