Sciweavers

179 search results - page 1 / 36
» Security Policy Enforcement Through Refinement Process
Sort
View
111
Voted
B
2007
Springer
15 years 4 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
98
Voted
ESOP
2010
Springer
15 years 9 months ago
Enforcing Stateful Authorization and Information Flow Policies in Fine
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforce their security policies would help, but, to date, no security-typed language h...
Nikhil Swamy, Juan Chen and Ravi Chugh
201
Voted
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
16 years 14 days ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
BIRTHDAY
2006
Springer
15 years 4 months ago
Composition by Colimit and Formal Software Development
Abstract. Goguen emphasized long ago that colimits are how to compose systems [7]. This paper corroborates and elaborates Goguen's vision by presenting a variety of situations...
Douglas R. Smith
88
Voted
ICAS
2008
IEEE
151views Robotics» more  ICAS 2008»
15 years 6 months ago
Policy-Based Enforcement of Database Security Configuration through Autonomic Capabilities
Ghassan Jabbour, Daniel A. Menascé