Sciweavers

48 search results - page 8 / 10
» Practical static analysis for inference of security-related ...
Sort
View
POPL
2006
ACM
14 years 6 months ago
On flow-sensitive security types
This article investigates formal properties of a family of semantically sound flow-sensitive type systems for tracking information flow in simple While programs. The family is ind...
Sebastian Hunt, David Sands
POPL
2012
ACM
12 years 1 months ago
A type system for borrowing permissions
In object-oriented programming, unique permissions to object references are useful for checking correctness properties such as consistency of typestate and noninterference of conc...
Karl Naden, Robert Bocchino, Jonathan Aldrich, Kev...
FOAL
2007
ACM
13 years 10 months ago
Requirement enforcement by transformation automata
The goal of this work is to treat safety and security policies as requirements to be composed in an aspectual style with a developing application. Policies can be expressed either...
Douglas R. Smith
ISSTA
2006
ACM
14 years 7 days ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
UIST
2005
ACM
13 years 11 months ago
Artistic resizing: a technique for rich scale-sensitive vector graphics
When involved in the visual design of graphical user interfaces, graphic designers can do more than providing static graphics for programmers to incorporate into applications. We ...
Pierre Dragicevic, Stéphane Chatty, David T...