Sciweavers

246 search results - page 23 / 50
» A Security Infrastructure for Distributed Java Applications
Sort
View
ICCS
2004
Springer
15 years 3 months ago
A Concept of Replicated Remote Method Invocation
In this paper we present a new infrastructure for building distributed applications that communicate through remote objects. The objects are available by the use of the Java RMI, e...
Jerzy Brzezinski, Cezary Sobaniec
NSPW
2004
ACM
15 years 3 months ago
Symmetric behavior-based trust: a new paradigm for internet computing
Current models of Internet Computing are highly asymmetric – a host protects itself from malicious mobile Java programs, but there is no way to get assurances about the behavior...
Vivek Haldar, Michael Franz
OOPSLA
2007
Springer
15 years 3 months ago
Scalable omniscient debugging
Omniscient debuggers make it possible to navigate backwards in time within a program execution trace, drastically improving the task of debugging complex applications. Still, they...
Guillaume Pothier, Éric Tanter, José...
FTDCS
1999
IEEE
15 years 1 months ago
Lessons Learned from Building a Web-Based Spatial Data Discovery Facility
This paper discusses the lessons learned and decisions made while designing and developing a web-based application for the National Spatial Information Framework (NSIF) of South A...
Ferdie Danzfuss, Judith Bishop
IDTRUST
2009
ACM
15 years 4 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol