نتایج جستجو برای: language policies

تعداد نتایج: 546758  

2010
Johan Lilius Andreas Dahlin Lionel Morel

Modern embedded systems are often heterogeneous in that their design requires several description paradigms, based on different models of computation and concurrency (MoCCs). In this paper we present Rialto, a formal language intended at expressing computations in several MoCCs. The distinguishing features of Rialto and its implementation are 1) A formal semantics: the language is formalized us...

2014
Norman Sadeh Alessandro Acquisti Travis D. Breaux Lorrie Faith Cranor Aleecia M. McDonald Joel R. Reidenberg Noah A. Smith Fei Liu N. Cameron Russell Florian Schaub Shomir Wilson

Natural language privacy policies have become a de facto standard to address expectations of “notice and choice” on the Web. However, users generally do not read these policies and those who do read them struggle to understand their content. Initiatives aimed at addressing this problem through the development of machine-readable standards have run into obstacles, with many website operators sho...

2009
Lars E. Olson Carl A. Gunter William R. Cook Marianne Winslett

Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege in an access control matrix. RDBAC aids the management of database access controls by improving the expressiveness of policies. The Transaction Datalog language provides a powerful syntax and semantics for expressing RDBAC policies, howev...

2005

Secure foundations for systems design Systems designers typically develop secure systems architectures at higher levels than the programming-language level. While specification languages such as Unified Modeling Language (UML) provide a way to express higher levels of system abstraction, the principal contribution of programming languages to systems security is lowand intermediate-level support...

2011
Jonas Magazinius Aslan Askarov Andrei Sabelfeld

Decentralization is a major challenge for secure computing. In a decentralized setting, principals are free to distrust each other. The key challenge is to provide support for expressing and enforcing expressive decentralized policies. This paper focuses on declassification policies, i.e., policies for intended information release. We propose a decentralized language-independent framework for e...

Journal: :CoRR 2015
Kirill Kogan Danushka Menikkumbura Gustavo Petri Youngtae Noh Sergey I. Nikolenko Patrick Th. Eugster

Buffering architectures and policies for their efficient management constitute one of the core ingredients of a network architecture. In this work we introduce a new specification language, BASEL, that allows to express virtual buffering architectures and management policies representing a variety of economic models. BASEL does not require the user to implement policies in a high-level language...

2005
JEFF HEMMER Michael S. Gorham

This essay is essentially divided into three parts. The first part is going to focus on early Soviet attitudes towards the Russian language itself, followed by a discussion of the early Soviet policies regarding non-Russian languages in the second part. The gradual shift away from the liberal language policies of the 1920s towards the new policies emerging in the late 1930s, overtly imposing Ru...

Journal: :CoRR 2015
Ta Vinh Thong

In this paper, we address the problem of systematic privacy policy and privacy architecture design. We focus on two relevant aspects of privacy, namely, accountability and personal data control. We propose a systematic design approach of privacy policies adapting the current international data protection regulations, as well as an automated privacy architectures generation method from the corre...

1990
Gail E. Kaiser Wenwey Hseush Steven S. Popovich Shyhtsun Felix Wu

Object-oriented systems have been generally recognized as a good choice for approaching a range of parallel and distributed programming problems. But different parallel and distributed applications have different consistency models, so multiple concurrency control policies are needed. When objects are shared among applications with different policies, multiple policies must operate simultaneous...

2003
Beata Sarna-Starosta Scott D. Stoller

Security-Enhanced Linux (SELinux) extends Linux with a flexible mandatory access control mechanism that enforces security policies expressed in SELinux’s policy language. Determining whether a given policy meets a site’s high-level security goals can be difficult, due to the low-level nature of the policy language and the size and complexity of SELinux policies. We propose a logic-programming-b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید