History-based access control with local policies

M Bartoletti, P Degano, GL Ferrari - … , FOSSACS 2005, Held as Part of the …, 2005 - Springer
An extension of the λ-calculus is proposed, to study history-based access control. It allows
for security policies with a possibly nested, local scope. We define a type and effect system …

Micro embedded monitoring for security in application specific instruction-set processors

RG Ragel, S Parameswaran, SM Kia - Proceedings of the 2005 …, 2005 - dl.acm.org
This paper presents a methodology for monitoring security in Application Specific Instruction-
set Processors (ASIPs). This is a generalized methodology for inline monitoring insecure …

[图书][B] A compositional logic for control flow and its application in foundational proof-carrying code

G Tan - 2005 - search.proquest.com
Abstract Proof-Carrying Code (PCC) is a static mechanism that mechanically verifies type
safety of machine-language programs. But the problem in conventional PCC is, who will …

Policy framings for access control

M Bartoletti, P Degano, GL Ferrari - … of the 2005 workshop on Issues in …, 2005 - dl.acm.org
A new model for access control is proposed, based on policy framings embedded into
histories of execution. This allows for policies that have a possibly nested, local scope. In …

[PDF][PDF] Contrôle des ressources dans les cartes à microprocesseur

A Galland, D Deville, G Grimaud… - These de doctorat, l' …, 2005 - pages.lip6.fr
Résumé Les cartes à puces ont évolué vers le concept de cartes ouvertes. Ce sont des
cartes où l'on peut charger des applications après qu'elles aient été émises (distribuées à …

Flow logic for language-based safety and security

RR Hansen - 2005 - orbit.dtu.dk
Society is increasingly dependent on information and communication technology.
Computers are integrated into everything from toasters to control systems for critical …

[PDF][PDF] Language-based security: access control and static analysis

M Bartoletti - 2005 - Citeseer
We study security of mobile code at a linguistic level. In particular, we tackle the problem of
designing expressive and efficient models for access control, as well as improving the …

[PDF][PDF] 一种用于Java 程序验证编译的标签类型

陈晖, 陈意云, 茹祥民 - 软件学报, 2005 - jos.org.cn
在基于语言考虑代码安全性的工作中, 往往需要将高级语言程序翻译成类型化低级语言的程序
进行类型检查. 许多高级语言具有类型调度结构, 在向低级语言的编译过程中需要用标签机制来 …

[PDF][PDF] Semantic Approaches to Global Computing Systems

R De Nicola - 2005 - academia.edu
Programming computational infrastructures available globally for offering uniform services
has become one of the main issues in Computer Science. The challenges come from the …

[PDF][PDF] λ-RBAC: Programmatic Role-Based Access Control

R Jagadeesan, A Jeffrey, C Pitcher, J Riely - fpl.cs.depaul.edu
The context of this paper is enlarging the scope of foundational, language-based security
methods (see [31, 19, 3] for surveys) to the realm of programming role-based access control …