Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Preventing dynamic library compromise on node. js via rwx-based privilege reduction
Third-party libraries ease the development of large-scale software systems. However,
libraries often execute with significantly more privilege than needed to complete their task …
libraries often execute with significantly more privilege than needed to complete their task …
Expressing information flow properties
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …
to handle sensitive information responsibly. Regulatory requirements and user expectations …
Reasoning about object capabilities with logical relations and effect parametricity
Object capabilities are a technique for fine-grained privilege separation in programming
languages and systems, with important applications in security. However, current formal …
languages and systems, with important applications in security. However, current formal …
A capability-based module system for authority control
The principle of least authority states that each component of the system should be given
authority to access only the information and resources that it needs for its operation. This …
authority to access only the information and resources that it needs for its operation. This …
Enabling end-to-end orchestration of multi-cloud applications
K Alexander, C Lee, E Kim, S Helal - IEEE Access, 2017 - ieeexplore.ieee.org
The orchestration of application components across heterogeneous cloud providers is a
problem that has been tackled using various approaches, some of which led to the creation …
problem that has been tackled using various approaches, some of which led to the creation …
QR factorization of tall and skinny matrices in a grid computing environment
Previous studies have reported that common dense linear algebra operations do not
achieve speed up by using multiple geographical sites of a computational grid. Because …
achieve speed up by using multiple geographical sites of a computational grid. Because …
Extensible access control with authorization contracts
Existing programming language access control frameworks do not meet the needs of all
software components. We propose an expressive framework for implementing access …
software components. We propose an expressive framework for implementing access …
On access control, capabilities, their equivalence, and confused deputy attacks
Motivated by the problem of understanding the difference between practical access control
and capability systems formally, we distill the essence of both in a language-based setting …
and capability systems formally, we distill the essence of both in a language-based setting …
Necessity specifications for robustness
Robust modules guarantee to do only what they are supposed to do–even in the presence
of untrusted malicious clients, and considering not just the direct behaviour of individual …
of untrusted malicious clients, and considering not just the direct behaviour of individual …
Capabilities: Effects for free
Object capabilities are increasingly used to reason informally about the properties of secure
systems. But can capabilities also aid in formal reasoning? To answer this question, we …
systems. But can capabilities also aid in formal reasoning? To answer this question, we …