Skip to main content
Article thumbnail
Location of Repository

Types for Lexically-Scoped Access Control *

By Tachio Terauchi and Alex AikenJeffrey S. Foster, Tachio Terauchi, Jeffrey S. Foster and Alex Aiken

Abstract

1 Introduction In situations where a program P interacts with one or more untrusted program components U, a well-specifiedaccess control policy protects P 's resources from unwanted operations performed by U.Systems such as Java and the Common Language Runtime (CLR) provide a mechanism for defining an

Year: 2003
OAI identifier: oai:CiteSeerX.psu:10.1.1.135.3076
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://www.cs.umd.edu/~jfoster... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.