Abstract. This paper introduces notions of resource policy for mobile code to be run on smart devices, to integrate with the proof-carrying code architecture of the Mobile Resource Guarantees (MRG) project. Two forms of policy are used: guaranteed policies which come with proofs and target policies which describe limits of the device. A guaranteed policy is expressed as a function of a methods input sizes, which determines a bound on consumption of some resource. A target policy is defined by a constant bound and input constraints for a method. A recipient of mobile code chooses whether to run methods by comparing between a guaranteed policy and the target policy. Since delivered code may use methods implemented on the target machine, guara...
AbstractWe explore an intuitionistic fragment of Artëmov’s Justification Logic as a type system for ...
International audienceThis article describes an approach for the automated verification of mobile sy...
Abstract — Mobile code security has developed into a significant research area as users are increasi...
Abstract: The Mobile Resource Guarantees (MRG) project has developed a proof-carrying-code infrastru...
This paper summarises the main outcomes of the Mobile Resource Guarantees (MRG) project, which focus...
Proof-Carrying Code (PCC) is a general approach to mobile code safety in which the code supplier aug...
AbstractIn the Mobile Resource Guarantees project's Proof Carrying Code implementation, .class files...
sekar @ cs.sunysb.edu Existing approaches for mobile code security tend to take a conser-vative view...
AbstractFailing to control resources in mobile, concurrent and distributed systems may lead to impor...
Failing to control resources in mobile, concurrent and distributed systems may lead to important bre...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-c...
International audienceA model of resource access control is presented in which the access control to...
We consider the problems raised by the use of mobile code in e-Science. If a user submits a program ...
AbstractRecent approaches to mobile code safety, like proof-carrying code, involve associating safet...
AbstractWe explore an intuitionistic fragment of Artëmov’s Justification Logic as a type system for ...
International audienceThis article describes an approach for the automated verification of mobile sy...
Abstract — Mobile code security has developed into a significant research area as users are increasi...
Abstract: The Mobile Resource Guarantees (MRG) project has developed a proof-carrying-code infrastru...
This paper summarises the main outcomes of the Mobile Resource Guarantees (MRG) project, which focus...
Proof-Carrying Code (PCC) is a general approach to mobile code safety in which the code supplier aug...
AbstractIn the Mobile Resource Guarantees project's Proof Carrying Code implementation, .class files...
sekar @ cs.sunysb.edu Existing approaches for mobile code security tend to take a conser-vative view...
AbstractFailing to control resources in mobile, concurrent and distributed systems may lead to impor...
Failing to control resources in mobile, concurrent and distributed systems may lead to important bre...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-c...
International audienceA model of resource access control is presented in which the access control to...
We consider the problems raised by the use of mobile code in e-Science. If a user submits a program ...
AbstractRecent approaches to mobile code safety, like proof-carrying code, involve associating safet...
AbstractWe explore an intuitionistic fragment of Artëmov’s Justification Logic as a type system for ...
International audienceThis article describes an approach for the automated verification of mobile sy...
Abstract — Mobile code security has developed into a significant research area as users are increasi...