Results 1 - 10
of
17
Tom: Piggybacking Rewriting on Java
, 2007
"... We present the Tom language that extends Java with the purpose of providing high level constructs inspired by the rewriting community. Tom furnishes a bridge between a general purpose language and higher level specifications that use rewriting. This approach was motivated by the promotion of rewriti ..."
Abstract
-
Cited by 62 (11 self)
- Add to MetaCart
We present the Tom language that extends Java with the purpose of providing high level constructs inspired by the rewriting community. Tom furnishes a bridge between a general purpose language and higher level specifications that use rewriting. This approach was motivated by the promotion of rewriting techniques and their integration in large scale applications. Powerful matching capabilities along with a rich strategy language are among Tom’s strong points, making it easy to use and competitive with other rule based languages.
Rewrite Based Specification of Access Control Policies
- SECRET 2008 PRELIMINARY VERSION
, 2008
"... Data protection within information systems is one of the main concerns in computer systems security and different access control policies can be used to specify the access requests that should be granted or denied. These access control mechanisms should guarantee that information can be accessed onl ..."
Abstract
-
Cited by 8 (3 self)
- Add to MetaCart
Data protection within information systems is one of the main concerns in computer systems security and different access control policies can be used to specify the access requests that should be granted or denied. These access control mechanisms should guarantee that information can be accessed only by authorized users and thus prevent all information leakage. We propose a methodology for specifying and implementing access control policies using the rewrite based framework Tom. This approach allows us to check that any reachable state obtained following an access granted in the implementation satisfies the policy specification. We show that when security levels are not totally ordered some information leakage can be detected.
Bytecode Rewriting In Tom
- SECOND WORKSHOP ON BYTECODE SEMANTICS, VERIFICATION, ANALYSIS AND TRANSFORMATION
, 2007
"... In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extension of Java that adds pattern-matching facilities, to describe transformations. An originality of Tom is that it provides a ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extension of Java that adds pattern-matching facilities, to describe transformations. An originality of Tom is that it provides a powerful strategy language to express traversals over trees and to control how transformation rules are applied. To be even more expressive, we use CTL formulae as conditions and we show how their satisfiability can be ensured using the strategy formalism. Through small examples, we show how bytecode analysis and transformations can be defined in an elegant way. In particular, we outline the implementation of a ClassLoader parameterized by a security policy that restricts file access.
Analysis of Lattice-Based Access Control Policies using Rewiting Systems and Tom
- 1ST LUXEMBOURG DAY ON SECURITY AND RELIABILITY
, 2009
"... In this paper we show how access control policies can be specified using term rewriting systems and present the corresponding implementation realized using the Tom framework. We focus on two well known models (Bell-Lapadula and McLean) and propose an algorithm that detects potential information leak ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
In this paper we show how access control policies can be specified using term rewriting systems and present the corresponding implementation realized using the Tom framework. We focus on two well known models (Bell-Lapadula and McLean) and propose an algorithm that detects potential information leakages, i.e. checks that information can be accessed only by authorized users independently of the actions performed in a given system.
MDE Basics with a DSL Focus
"... Abstract. Small languages are gaining popularity in the software engi-neering community. The development of MOF and EMF has given the Domain Specific Language community a tremendous boost. In this tu-torial the basic aspects of model driven engineering in combination with Domain Specific Languages w ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract. Small languages are gaining popularity in the software engi-neering community. The development of MOF and EMF has given the Domain Specific Language community a tremendous boost. In this tu-torial the basic aspects of model driven engineering in combination with Domain Specific Languages will be discussed. The focus is on textual Domain Specific Languages developed using the language invention pat-tern. The notion of abstract syntax will be linked to metamodels as well as the definition of concrete syntax. Defining static and dynamic seman-tics will be discussed. A small but non trivial Domain Specific Language SLCO will be used to illustrate our ideas. 1
Project-Team PROTHEO Constraints, Mechanized Deduction and Proofs of Software Properties
"... d ' ctivity ..."
(Show Context)