Sciweavers

436 search results - page 35 / 88
» A secure execution framework for Java
Sort
View
CGO
2003
IEEE
15 years 3 months ago
Hiding Program Slices for Software Security
Given the high cost of producing software, development of technology for prevention of software piracy is important for the software industry. In this paper we present a novel app...
Xiangyu Zhang, Rajiv Gupta
RV
2010
Springer
153views Hardware» more  RV 2010»
14 years 7 months ago
Run-Time Verification of Networked Software
Most applications that are in use today inter-operate with other applications, so-called peers, over a network. The analysis of such distributed applications requires that the effe...
Cyrille Valentin Artho
CASSIS
2004
Springer
15 years 3 months ago
History-Based Access Control and Secure Information Flow
Abstract. This paper addresses the problem of static checking of programs to ensure that they satisfy confidentiality policies in the presence of dynamic access control in the for...
Anindya Banerjee, David A. Naumann
ECIS
2000
14 years 11 months ago
Secure Access to Medical Data over the Internet
The concept of context-dependent access control has emerged during the last years: Information about the state of a process model of a working environment is combined with general ...
Ulrich Ultes-Nitsche, Stephanie Teufel
64
Voted
WSC
2007
15 years 4 hour ago
An object-oriented framework for simulating full truckload transportation networks
In this paper, we discuss the design and use of an objectoriented framework for simulating full truckload (FTL) networks. We present a context for how the framework can be used th...
Manuel D. Rossetti, Shikha Nangia