Sciweavers

591 search results - page 74 / 119
» Embracing policy engineering
Sort
View
KBSE
2010
IEEE
14 years 8 months ago
Analyzing security architectures
We present a semi-automated approach, Secoria, for analyzing a security runtime architecture for security and for conformance to an object-oriented implementation. Typecheckable a...
Marwan Abi-Antoun, Jeffrey M. Barnes
ICSE
2008
IEEE-ACM
15 years 10 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
AOSD
2007
ACM
15 years 1 months ago
Aspect-oriented application-level scheduling for J2EE servers
Achieving sufficient execution performance is a challenging goal of software development. Unfortunately, violating performance requirements is often revealed at a late stage of th...
Kenichi Kourai, Hideaki Hibino, Shigeru Chiba
91
Voted
EUROSYS
2010
ACM
15 years 6 months ago
Dr. Multicast: Rx for Data Center Communication Scalability
Data centers avoid IP Multicast because of a series of problems with the technology. We propose Dr. Multicast (MCMD), a system that maps IPMC operations to a combination of point-...
Ymir Vigfusson, Hussam Abu-Libdeh, Mahesh Balakris...
CSE
2009
IEEE
15 years 4 months ago
Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control
Abstract—Vocabulary alignment is a main challenge in distributed access control as peers should understand each other’s policies unambiguously. Ontologies enable mutual underst...
Daniel Trivellato, Fred Spiessens, Nicola Zannone,...