Sciweavers

576 search results - page 87 / 116
» Implementing a secure setuid program
Sort
View
SOFSEM
2005
Springer
15 years 7 months ago
Tier Aspect Model Based on Updatable Views
The tier aspect model addresses Aspect Oriented Programming (AOP) in the context of database applications. It is a new technique of separation of concerns through tiers implemented...
Radoslaw Adamus, Kazimierz Subieta
98
Voted
IFIP
2003
Springer
15 years 7 months ago
On Demand Network Level Service Deployment in Ad Hoc Networks
Many network level services such as routing, auto-addressing and, security have been proposed for ad hoc networks. Each has characteristics that may cause it to outperform similar ...
Daniel Prince, Andrew Scott, W. D. Shepherd
SIGOPSE
2000
ACM
15 years 6 months ago
Multiprocessing and portability for PDAs
The role of small devices in the emerging all-connected computer infrastructure is growing. So are the requirements that the application execution environments face. Portability, ...
Grzegorz Czajkowski
129
Voted
CADE
2000
Springer
15 years 6 months ago
Machine Instruction Syntax and Semantics in Higher Order Logic
Abstract. Proof-carrying code and other applications in computer security require machine-checkable proofs of properties of machine-language programs. These in turn require axioms ...
Neophytos G. Michael, Andrew W. Appel
LISA
2008
15 years 4 months ago
Authentication on Untrusted Remote Hosts with Public-Key Sudo
Two common tools in Linux- and UNIX-based environments are SSH for secure communications and sudo for performing administrative tasks. These are independent programs with substant...
Matthew Burnside, Mack Lu, Angelos D. Keromytis