Sciweavers

129 search results - page 16 / 26
» Guidelines for designing IT security management tools
Sort
View
ECUMN
2007
Springer
15 years 3 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 1 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
LISA
2007
14 years 11 months ago
Stork: Package Management for Distributed VM Environments
In virtual machine environments each application is often run in its own virtual machine (VM), isolating it from other applications running on the same physical machine. Contentio...
Justin Cappos, Scott M. Baker, Jeremy Plichta, Duy...
OOPSLA
2007
Springer
15 years 3 months ago
A proposal for taming uncertainty in the collaborative conceptual model development process
There have been various proposals for the formalization of appropriate viewpoint-based frameworks. The model that we intend to devise attempts to provide a basis for conceptual mo...
Ebrahim Bagheri
AOSD
2004
ACM
15 years 2 months ago
What are the key issues for commercial AOP use: how does AspectWerkz address them?
AspectWerkz is a framework targeted towards dynamic aspectoriented programming (AOP) in commercial applications. Based on our experience designing and supporting AspectWerkz, we h...
Jonas Bonér