Research on policy strategies for implementing energy retrofits in the residential buildings

H Zhang, K Hewage, H Karunathilake, H Feng… - Journal of Building …, 2021 - Elsevier
Energy retrofits are significant in improving the energy efficiency of existing residential
buildings (ERB) and mitigating greenhouse gas emissions. While many countries have …

[КНИГА][B] The compiler design handbook: optimizations and machine code generation

YN Srikant, P Shankar - 2002 - taylorfrancis.com
The widespread use of object-oriented languages and Internet security concerns are just the
beginning. Add embedded systems, multiple memory banks, highly pipelined units …

{SEApp}: Bringing mandatory access control to Android apps

M Rossi, D Facchinetti, E Bacis, M Rosa… - 30th USENIX Security …, 2021 - usenix.org
Mandatory Access Control (MAC) has provided a great contribution to the improvement of
the security of modern operating systems. A clear demonstration is represented by Android …

Liquid information flow control

N Polikarpova, D Stefan, J Yang, S Itzhaky… - Proceedings of the …, 2020 - dl.acm.org
We present Lifty, a domain-specific language for data-centric applications that manipulate
sensitive data. A Lifty programmer annotates the sources of sensitive data with declarative …

Design and implementation of an intrusion response system for relational databases

A Kamra, E Bertino - IEEE Transactions on Knowledge and …, 2010 - ieeexplore.ieee.org
The intrusion response component of an overall intrusion detection system is responsible for
issuing a suitable response to an anomalous request. We propose the notion of database …

Mining security-sensitive operations in legacy code using concept analysis

V Ganapathy, D King, T Jaeger… - … Conference on Software …, 2007 - ieeexplore.ieee.org
This paper presents an approach to statically retrofit legacy servers with mechanisms for
authorization policy enforcement. The approach is based upon the observation that security …

Leveraging" choice" to automate authorization hook placement

D Muthukumaran, T Jaeger, V Ganapathy - Proceedings of the 2012 …, 2012 - dl.acm.org
When servers manage resources on behalf of multiple, mutually-distrusting clients, they
must mediate access to those resources to ensure that each client request complies with an …