Sciweavers

195 search results - page 16 / 39
» Composable Encapsulation Policies
Sort
View
CSFW
2005
IEEE
15 years 3 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook
CSFW
2000
IEEE
15 years 1 months ago
Secure Composition of Untrusted Code: Wrappers and Causality Types
We consider the problem of assembling concurrent software systems from untrusted or partially trusted o -the-shelf components, using wrapper programs to encapsulate components and...
Peter Sewell, Jan Vitek
APSEC
1995
IEEE
15 years 1 months ago
Development of Distributed Applications with Separation of Concerns
The development of distributed applications is an open area involving researchers from different communities. We propose an object-oriented approach to the development of distribu...
António Rito Silva, Pedro Sousa, José...
USENIX
2000
14 years 11 months ago
Pandora: A Flexible Network Monitoring Platform
This paper presents Pandora, a network monitoring platform that captures packets using purely passive techniques. Pandora addresses current needs for improving Internet middleware...
Simon Patarin, Mesaac Makpangou
86
Voted
RTSS
2007
IEEE
15 years 3 months ago
Integrating Adaptive Components: An Emerging Challenge in Performance-Adaptive Systems and a Server Farm Case-Study
The increased complexity of performance-sensitive software systems leads to increased use of automated adaptation policies in lieu of manual performance tuning. Composition of ada...
Jin Heo, Dan Henriksson, Xue Liu, Tarek F. Abdelza...