Sciweavers

104 search results - page 2 / 21
» Java in the box: implementing the BoxScript component langua...
Sort
View
DIMVA
2010
13 years 5 months ago
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
Adam Doupé, Marco Cova, Giovanni Vigna
ECOOP
1998
Springer
13 years 7 months ago
Orthogonal to the Java Imperative
Three nontrivial limitations of the existing JavaT M technology are considered from the viewpoint of object-oriented database technology. The limitations are: lack of support for o...
Suad Alagic, Jose Solorzano, David Gitchell
DEXAW
2005
IEEE
116views Database» more  DEXAW 2005»
13 years 9 months ago
Security Analysis of Mobile Java
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
FORTE
2009
13 years 1 months ago
Typing Component-Based Communication Systems
Abstract. Building complex component-based software systems, for instance communication systems based on the Click, Coyote, Appia, or Dream frameworks, can lead to subtle assemblag...
Michael Lienhardt, Claudio Antares Mezzina, Alan S...
SNPD
2008
13 years 5 months ago
The Implementation and Execution Framework of a Role Model Based Language, EpsilonJ
In the social reality, objects communicate with each other by means of assuming roles to establish collaboration, and then can adaptively change their roles to obtain other intera...
Supasit Monpratarnchai, Tamai Tetsuo