Sciweavers

1821 search results - page 1 / 365
» Security-Aware Program Transformations
Sort
View
ICTCS
2003
Springer
13 years 10 months ago
Security-Aware Program Transformations
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
REFLECTION
2001
Springer
13 years 9 months ago
A Simple Security-Aware MOP for Java
This article investigates the security problems raised by the use of proxy-based runtime meta-object protocols (MOPs) for Java and provides an approach for making meta-level code t...
Denis Caromel, Fabrice Huet, Julien Vayssiè...
ESSOS
2010
Springer
14 years 1 months ago
Automatic Generation of Smart, Security-Aware GUI Models
In many software applications, users access application data using graphical user interfaces (GUIs). There is an important, but little explored, link between visualization and secu...
David A. Basin, Manuel Clavel, Marina Egea, Michae...
BWCCA
2010
12 years 12 months ago
Constructivist Approach to Information Security Awareness in the Middle East
Abstract--This paper studies the application of an approach to enhance information security awareness amongst employees within middleeastern companies, in effort to improve informa...
Mohammed Boujettif, Yongge Wang
PLDI
2011
ACM
12 years 7 months ago
Systematic editing: generating program transformations from an example
Software modifications are often systematic—they consist of similar, but not identical, program changes to multiple contexts. Existing tools for systematic program transformati...
Na Meng, Miryung Kim, Kathryn S. McKinley