Sciweavers

23 search results - page 2 / 5
» iastedsea 2004
Sort
View
IASTEDSEA
2004
13 years 6 months ago
Insecurity by contract
Design by Contract is a design methodology that promotes software reliability and reusability by requiring each component module to have a well-specified interface and leaves a mo...
Phillip L. Nico, Clark Savage Turner, Kimberly Kno...
IASTEDSEA
2004
13 years 6 months ago
An object oriented approach to an identity based encryption cryptosystem
We describe an object oriented approach to developing an Identity Based Encryption system. We show how an existing API was reused and extended to facilitate our development of the...
Adam Duffy, Tom Dowling
IASTEDSEA
2004
13 years 6 months ago
Instance orientation: A programming methodology
Instance orientation is an approach for designing and programming software systems. It addresses a limitation of current software architectures: it allows multiple higherlevel vie...
Thomas Schöbel-Theuer
IASTEDSEA
2004
13 years 6 months ago
Erroneous architecture is a relative concept
The problem this paper addresses is that an architecture formed of software components can contain composition errors (introduced, for instance, as a result of the choice of afram...
Jirí Adámek, Frantisek Plasil
IASTEDSEA
2004
13 years 6 months ago
Java bytecode verification with dynamic structures
Java applets run on a Virtual Machine that checks code's integrity and correctness before execution using a module called Bytecode Verifier. Java Card technology allows Java ...
Cinzia Bernardeschi, Luca Martini, Paolo Masci