Sciweavers

4386 search results - page 693 / 878
» A Tamper-Resistant Programming Language System
Sort
View
199
Voted
VEE
2012
ACM
226views Virtualization» more  VEE 2012»
13 years 11 months ago
Protecting applications against TOCTTOU races by user-space caching of file metadata
Time Of Check To Time Of Use (TOCTTOU) race conditions for file accesses in user-space applications are a common problem in Unix-like systems. The mapping between filename and i...
Mathias Payer, Thomas R. Gross
268
Voted
SIGCOMM
2012
ACM
13 years 5 months ago
Abstractions for network update
ions for Network Update Mark Reitblatt Cornell Nate Foster Cornell Jennifer Rexford Princeton Cole Schlesinger Princeton David Walker Princeton Configuration changes are a common...
Mark Reitblatt, Nate Foster, Jennifer Rexford, Col...
EMSOFT
2004
Springer
15 years 8 months ago
Exploiting prescriptive aspects: a design time capability
Aspect oriented programming (AOP), when used well, has many advantages. Aspects are however, programming-time constructs, i.e., they relate to source code. Previously, we develope...
John A. Stankovic, Prashant Nagaraddi, Zhendong Yu...
138
Voted
ECOOP
2000
Springer
15 years 7 months ago
OpenJIT: An Open-Ended, Reflective JIT Compiler Framework for Java
Abstract. OpenJIT is an open-ended, reflective JIT compiler framework for Java being researched and developed in a joint project by Tokyo Inst. Tech. and Fujitsu Ltd. Although in g...
Hirotaka Ogawa, Kouya Shimura, Satoshi Matsuoka, F...
241
Voted
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
16 years 3 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks