Sciweavers

576 search results - page 88 / 116
» Implementing a secure setuid program
Sort
View
94
Voted
DAGSTUHL
2007
15 years 3 months ago
Towards a General Framework for Modelling Roles
Role is a widespread concept, it is used in many areas like MAS, Programming Languages, Organizations, Security and OO modelling. Unfortunately, it seems that the literature is not...
Valerio Genovese
IADIS
2003
15 years 3 months ago
Com Technology for Remote Database Connectivity with Wireless PDAS
The potential software market for client-side mobile applications is strongly dependent upon the ability to rapidly migrate existing in-house software solutions, while maintaining...
David Olivieri, Juan Fco. Gálvez Gál...
JOT
2007
106views more  JOT 2007»
15 years 2 months ago
Extending eclipse RCP with dynamic update of active plug-ins
While the dynamic linking mechanism of modern programming languages, such as Java, allows loading of classes dynamically, it does not allow class reloading. Hence, dynamic linking...
Allan Raundahl Gregersen, Bo Nørregaard J&o...
HPCA
2008
IEEE
16 years 2 months ago
Thread-safe dynamic binary translation using transactional memory
Dynamic binary translation (DBT) is a runtime instrumentation technique commonly used to support profiling, optimization, secure execution, and bug detection tools for application...
JaeWoong Chung, Michael Dalton, Hari Kannan, Chris...
141
Voted
ICFP
2003
ACM
16 years 2 months ago
A static type system for JVM access control
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementat...
Tomoyuki Higuchi, Atsushi Ohori