Self Management and the Future of Software Design
Electronic Notes in Theoretical Computer Science (ENTCS)
A critique of the GNU hurd multi-server operating system
ACM SIGOPS Operating Systems Review
Access control for the services oriented architecture
Proceedings of the 2007 ACM workshop on Secure web services
Delegating responsibility in digital systems: Horton's "who done it?"
HOTSEC'07 Proceedings of the 2nd USENIX workshop on Hot topics in security
Verifiable functional purity in java
Proceedings of the 15th ACM conference on Computer and communications security
Tahoe: the least-authority filesystem
Proceedings of the 4th ACM international workshop on Storage security and survivability
Non-delegatable authorities in capability systems
Journal of Computer Security
Adding State and Visibility Control to Traits Using Lexical Nesting
Genoa Proceedings of the 23rd European Conference on ECOOP 2009 --- Object-Oriented Programming
Object-oriented coordination in mobile ad hoc networks
COORDINATION'07 Proceedings of the 9th international conference on Coordination models and languages
Fine-grained privilege separation for web applications
Proceedings of the 19th international conference on World wide web
Object views: fine-grained sharing in browsers
Proceedings of the 19th international conference on World wide web
SOFSEM'08 Proceedings of the 34th conference on Current trends in theory and practice of computer science
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems
Class properties for security review in an object-capability subset of Java: (short paper)
PLAS '10 Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security
capDL: a language for describing capability-based systems
Proceedings of the first ACM asia-pacific workshop on Workshop on systems
Gadara: dynamic deadlock avoidance for multithreaded programs
OSDI'08 Proceedings of the 8th USENIX conference on Operating systems design and implementation
Retaining sandbox containment despite bugs in privileged memory-safe code
Proceedings of the 17th ACM conference on Computer and communications security
Proxies: design principles for robust object-oriented intercession APIs
Proceedings of the 6th symposium on Dynamic languages
Modules as objects in newspeak
ECOOP'10 Proceedings of the 24th European conference on Object-oriented programming
Read-only execution for dynamic languages
TOOLS'10 Proceedings of the 48th international conference on Objects, models, components, patterns
Proceedings of the tenth international conference on Aspect-oriented software development
Exploiting modular access control for advanced policies
Proceedings of the tenth international conference on Aspect-oriented software development companion
Diesel: applying privilege separation to database access
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Transactions on computational science XI
Vistas: towards behavioural cloud control
Euro-Par 2010 Proceedings of the 2010 conference on Parallel processing
Rounding pointers: type safe capabilities with C++ meta programming
PLOS '11 Proceedings of the 6th Workshop on Programming Languages and Operating Systems
Virtual values for language extension
Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications
CREST: principled foundations for decentralized systems
Proceedings of the ACM international conference companion on Object oriented programming systems languages and applications companion
Analysing the information flow properties of object-capability patterns
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
Features and object capabilities: reconciling two visions of modularity
Proceedings of the 11th annual international conference on Aspect-oriented Software Development
Capabilities for information flow
Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Proceedings of the 2012 Haskell Symposium
Better security and privacy for web browsers: a survey of techniques, and a new implementation
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
Scoped synchronization constraints for large scale actor systems
COORDINATION'12 Proceedings of the 14th international conference on Coordination Models and Languages
Enforcing user-space privilege separation with declarative architectures
Proceedings of the seventh ACM workshop on Scalable trusted computing
BottleCap: a credential manager for capability systems
Proceedings of the seventh ACM workshop on Scalable trusted computing
Chaperones and impersonators: run-time support for reasonable interposition
Proceedings of the ACM international conference on Object oriented programming systems languages and applications
Security rationale for a cooperative backup service for mobile devices
LADC'07 Proceedings of the Third Latin-American conference on Dependable Computing
Proceedings of the 2nd edition on Programming systems, languages and applications based on actors, agents, and decentralized control abstractions
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications
Proceedings of the 28th Annual Computer Security Applications Conference
Distributed electronic rights in javascript
ESOP'13 Proceedings of the 22nd European conference on Programming Languages and Systems
Higher-order functional reactive programming without spacetime leaks
Proceedings of the 18th ACM SIGPLAN international conference on Functional programming
Polymorphic identifiers: uniform resource access in objective-smalltalk
Proceedings of the 9th symposium on Dynamic languages
Efficient dynamic access analysis using JavaScript proxies
Proceedings of the 9th symposium on Dynamic languages
Modelling Access Propagation in Dynamic Systems
ACM Transactions on Information and System Security (TISSEC)
Trustworthy proxies: virtualizing objects with invariants
ECOOP'13 Proceedings of the 27th European conference on Object-Oriented Programming
replay: visualising the structure and behaviour of interconnected systems
ACSC '13 Proceedings of the Thirty-Sixth Australasian Computer Science Conference - Volume 135
Bringing java's wild native world under control
ACM Transactions on Information and System Security (TISSEC)
Security and privacy for augmented reality systems
Communications of the ACM
Hi-index | 0.02 |
When separately written programs are composed so that they may cooperate, they may instead destructively interfere in unanticipated ways. These hazards limit the scale and functionality of the software systems we can successfully compose. This dissertation presents a framework for enabling those interactions between components needed for the cooperation we intend, while minimizing the hazards of destructive interference. Great progress on the composition problem has been made within the object paradigm, chiefly in the context of sequential, single-machine programming among benign components. We show how to extend this success to support robust composition of concurrent and potentially malicious components distributed over potentially malicious machines. We present E, a distributed, persistent, secure programming language, and CapDesk, a virus-safe desktop built in E, as embodiments of the techniques we explain.