Sciweavers

351 search results - page 23 / 71
» Building Secure and Reliable Network Applications
Sort
View
IEEEAMS
2002
IEEE
15 years 6 months ago
The Design and Implementation of the A2QM3 System
In this paper we present the design, architecture and implementation of the A2QM3 System. It provides programmers re-usable QoS-aware Control Objects to enable building a complete...
Balázs Csizmazia, Hermann Hellwagner
NDSS
2003
IEEE
15 years 7 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
15 years 8 months ago
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectab...
Christian Krätzer, Jana Dittmann, Andreas Lan...
COLCOM
2005
IEEE
15 years 7 months ago
On-demand overlay networking of collaborative applications
We propose a new overlay network, called Generic Identifier Network (GIN), for collaborative nodes to share objects with transactions across affiliated organizations by merging th...
Cheng-Jia Lai, Richard R. Muntz
ICSE
2005
IEEE-ACM
16 years 2 months ago
An architects guide to enterprise application integration with J2EE and .NET
Architects are faced with the problem of building enterprise scale information systems, with streamlined, automated internal business processes and web-enabled business functions,...
Ian Gorton, Anna Liu