Computational paradigms and protection

Research output: Chapter in Book/Report/Conference proceedingsChapterpeer-review

Abstract

We investigate how protection requirements may be specified and implemented using the imperative, availability and coercion paradigms. Conventional protection mechanisms generally follow the imperative paradigm, requiring explicit and often centralized control over the sequencing and the mediation of security critical operations. This paper illustrates how casting protection in the availability and/or coercion styles provides the basis for more flexible and potentially distributed control over the sequencing and mediation of these operations.

Original languageEnglish
Title of host publicationProceedings New Security Paradigms Workshop
PublisherAssociation for Computing Machinery (ACM)
Pages3-11
Number of pages9
ISBN (Electronic)9781581134575
DOIs
Publication statusPublished - 2001
Event2001 New Security Paradigms Workshop, NSPW 2001 - Cloudcroft, NM, United States
Duration: 10 Sep 200113 Sep 2001

Publication series

NameProceedings New Security Paradigms Workshop

Conference

Conference2001 New Security Paradigms Workshop, NSPW 2001
Country/TerritoryUnited States
CityCloudcroft, NM
Period10/09/0113/09/01

Keywords

  • Condensed graphs
  • Functional and dataflow programming
  • Imperative
  • Protection mechanisms
  • Security models

Fingerprint

Dive into the research topics of 'Computational paradigms and protection'. Together they form a unique fingerprint.

Cite this