Sciweavers

351 search results - page 61 / 71
» Formalisation and implementation of Access control models
Sort
View
ASPLOS
2008
ACM
14 years 11 months ago
Dispersing proprietary applications as benchmarks through code mutation
Industry vendors hesitate to disseminate proprietary applications to academia and third party vendors. By consequence, the benchmarking process is typically driven by standardized...
Luk Van Ertvelde, Lieven Eeckhout
93
Voted
INTERNET
2010
170views more  INTERNET 2010»
14 years 8 months ago
Developing RESTful Web Services with Webmachine
bstractions and mechanisms Webmachine supplies to RESTful Web services developers. Not Your Typical Framework Web services frameworks typically fall into one of the following broad...
Justin Sheehy, Steve Vinoski
GCC
2003
Springer
15 years 2 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
SACMAT
2009
ACM
15 years 4 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
109
Voted
SEFM
2007
IEEE
15 years 3 months ago
An AOP Extended Lambda-Calculus
This paper presents an implicitly-typed functional, aspect-oriented programming language: λ AOP. The main contribution of the paper is a semantics for λ AOP advice weaving. The ...
Dima Alhadidi, Nadia Belblidia, Mourad Debbabi, Pr...