Sciweavers

257 search results - page 29 / 52
» Extending Java for Package based Access Control
Sort
View
SACMAT
2003
ACM
15 years 7 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
ENTCS
2007
168views more  ENTCS 2007»
15 years 1 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...
KBSE
2006
IEEE
15 years 7 months ago
Automated Reasoning on Aspects Interactions
The aspect-oriented paradigm allows weaving aspects in different join points of a program. Aspects can modify object fields and method control flow, thus possibly introducing subt...
Paolo Falcarin, Marco Torchiano
ACSAC
2002
IEEE
15 years 6 months ago
Safe Virtual Execution Using Software Dynamic Translation
Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing ...
Kevin Scott, Jack W. Davidson
CD
2004
Springer
15 years 7 months ago
JPloy: User-Centric Deployment Support in a Component Platform
Based on a vision that, in the future, applications will be flexibly built out of small-grained components, we argue that current technologies do not adequately support component d...
Chris Lüer, André van der Hoek