Sciweavers

6 search results - page 1 / 2
» Obfuscation of design intent in object-oriented applications
Sort
View
DRM
2003
Springer
13 years 10 months ago
Obfuscation of design intent in object-oriented applications
Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of...
Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon
EDCC
1994
Springer
13 years 9 months ago
Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach
Security and reliability issues in distributed systems have been investigated for several years at LAAS using a technique called Fragmentation-Redundancy-Scattering (FRS). The aim ...
Jean-Charles Fabre, Yves Deswarte, Brian Randell
TOOLS
1998
IEEE
13 years 8 months ago
Designing Persistent Object-Oriented Software Architectures
Conventional object-oriented analysis delivers a business object model, which is transformed during design into collaborating class clusters which implement the business model...
Paul Taylor
HCI
2009
13 years 3 months ago
People-Oriented Programming: From Agent-Oriented Analysis to the Design of Interactive Systems
Where the Object-Oriented paradigm set about abstracting objects, iented (AO) theory draws on Psychology to abstract mentalist notions like: beliefs, perceptions, goals, and intent...
Steve Goschnick
OOPSLA
2005
Springer
13 years 10 months ago
Micro patterns in Java code
Micro patterns are similar to design patterns, except that micro patterns stand at a lower, closer to the implementation, level of abstraction. Micro patterns are also unique in t...
Joseph Gil, Itay Maman