SLIDE 1
Introduction
- Internet growth
⇒ Increasingly frequent attacks
- Heterogenous deployed software
⇒ More exploitable bugs
- Anonymity online
Real-time Access Control Reconfiguration By Ashish Gehani and - - PowerPoint PPT Presentation
Real-time Access Control Reconfiguration By Ashish Gehani and Gershon Kedem Department of Computer Science, Duke University Introduction Internet growth Increasingly frequent attacks Heterogenous deployed software More
L : Formal language X : Axioms I : Rules of inference Q : Proof technique
enableSafeguard(Permission p) disableSafeguard(Permission p)
public abstract class PredicateThread extends Thread{ protected PredicateThread(Permission permission, Object lock); public void run(){ if(condition) result=true; synchronized(lock){ lock.notify(); } } public boolean getResult(); }