Back to Results
First PageMeta Content
Logic / Mathematical logic / First-order logic / Model theory / Predicate logic / Symbol / Computability / Finite-state machine / Linear temporal logic / Automata theory / Models of computation / Theoretical computer science


A Type System for Expressive Security Policies∗ David Walker Cornell University Strong type systems such as those of Java or ML provide provable guarantees about the run-time behaviour of programs. If we type check pro
Add to Reading List

Document Date: 1999-11-02 01:07:11


Open Document

File Size: 219,60 KB

Share Result on Facebook

Company

Intel / Sun / /

Currency

pence / /

IndustryTerm

web browser / real-world security systems / type reconstruction algorithms / instrumentation algorithm / trusted computing base / type systems / verification software / program instrumentation tool / /

Organization

National Science Foundation / Cornell University / /

Person

Fred Schneider / David Walker / Ulfar Erlingsson / /

Position

Java security manager / straight-forward / manager in some cases / Harper / security manager / author of the security policy / malicious programmer / programmer / /

ProgrammingLanguage

Assembly Language / ML / Dependent ML / Java / /

Technology

Java system / instrumentation algorithm / Virtual Machine / operating system / Java / API / type reconstruction algorithms / /

SocialTag