Sciweavers

52 search results - page 9 / 11
» CPU Resource Control for Mobile Programs
Sort
View
POPL
2000
ACM
15 years 3 months ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
AAAI
1992
15 years 6 days ago
Reactive Navigation through Rough Terrain: Experimental Results
This paper describes a series of experiments that were performed on the Rocky III robot.1 Rocky III is a small autonomous rover capable of navigating through rough outdoor terrain...
David P. Miller, Rajiv S. Desai, Erann Gat, Robert...
SACMAT
2009
ACM
15 years 5 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
ESORICS
2000
Springer
15 years 2 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
PERCOM
2004
ACM
15 years 10 months ago
PCOM - A Component System for Pervasive Computing
Applications in the Pervasive Computing domain are challenged by the dynamism in which their execution environment changes, e.g. due to user mobility. As a result, applications ha...
Christian Becker, Marcus Handte, Gregor Schiele, K...