Composing security policies with polymer
- 12 June 2005
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 305-314
- https://doi.org/10.1145/1065010.1065047
Abstract
No abstract availableThis publication has 10 references indexed in Scilit:
- Edit automata: enforcement mechanisms for run-time security policiesInternational Journal of Information Security, 2005
- A theory of aspectsPublished by Association for Computing Machinery (ACM) ,2003
- Pointcuts and advice in higher-order languagesPublished by Association for Computing Machinery (ACM) ,2003
- Mechanisms for secure modular programming in JavaSoftware: Practice and Experience, 2003
- Flexible policy-directed code safetyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Stack inspectionPublished by Association for Computing Machinery (ACM) ,2002
- Enforceable security policiesACM Transactions on Information and System Security, 2000
- Enforcing trace properties by program transformationPublished by Association for Computing Machinery (ACM) ,2000
- Adding type parameterization to the Java languagePublished by Association for Computing Machinery (ACM) ,1997
- The protection of information in computer systemsProceedings of the IEEE, 1975