Skip to main content
Article thumbnail
Location of Repository

Types for Lexically-Scoped Access Control *

By Tachio Terauchi and Alex AikenJeffrey S. Foster, Tachio Terauchi, Jeffrey S. Foster and Alex Aiken


1 Introduction In situations where a program P interacts with one or more untrusted program components U, a well-specifiedaccess control policy protects P 's resources from unwanted operations performed by U.Systems such as Java and the Common Language Runtime (CLR) provide a mechanism for defining an

Year: 2003
OAI identifier: oai:CiteSeerX.psu:
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • (external link)
  • (external link)
  • Suggested articles

    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.