Sciweavers

329 search results - page 49 / 66
» A Theory of Secure Control Flow
Sort
View
119
Voted
CODASPY
2011
14 years 1 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
85
Voted
SIGCOMM
2010
ACM
14 years 9 months ago
capDL: a language for describing capability-based systems
Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker
WISTP
2010
Springer
14 years 7 months ago
Efficient and Effective Buffer Overflow Protection on ARM Processors
Although many countermeasures have been developed for desktop and server environments, buffer overflows still pose a big threat. The same approach can be used to target mobile devi...
Raoul Strackx, Yves Younan, Pieter Philippaerts, F...
ICFP
2008
ACM
15 years 9 months ago
AURA: a programming language for authorization and audit
This paper presents AURA, a programming language for access control that treats ordinary programming constructs (e.g., integers and recursive functions) and authorization logic co...
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianz...
AIED
2005
Springer
15 years 3 months ago
Computer Games as Intelligent Learning Environments: A River Ecosystem Adventure
Our goal in this work has been to bring together the entertaining and flow characteristics of video game environments with proven learning theories to advance the state of the art ...
Jason Tan, Chris Beers, Ruchi Gupta, Gautam Biswas