Proceedings of the 2004 ACM Symposium on Applied Computing 2004
DOI: 10.1145/967900.968193
|View full text |Cite
|
Sign up to set email alerts
|

Controlling data movement in global computing applications

Abstract: We present a programming notation aiming at protecting the secrecy of both host and agent data in global computing applications. The approach exploits annotations with sets of node addresses, called regions. A datum can be annotated with a region that specifies the network nodes that are allowed to interact with it. Network nodes come equipped with two region annotations specifying the nodes that can send data and spawn processes over them. The language semantics guarantees that computation proceeds according … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2004
2004
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 25 publications
0
1
0
Order By: Relevance
“…Finally, KLAIM [9,10,12,13] uses a capability type system to control operations on tuple spaces. The KLAIM approach uses a notion of security policies, which are declared at site level, but differs substantially from our approach in what concerns how policies are programmed and checked.…”
Section: Conclusion and Related Workmentioning
confidence: 99%
“…Finally, KLAIM [9,10,12,13] uses a capability type system to control operations on tuple spaces. The KLAIM approach uses a notion of security policies, which are declared at site level, but differs substantially from our approach in what concerns how policies are programmed and checked.…”
Section: Conclusion and Related Workmentioning
confidence: 99%