Sciweavers

3544 search results - page 441 / 709
» Information Security in Open Systems
Sort
View
SP
2003
IEEE
116views Security Privacy» more  SP 2003»
15 years 5 months ago
Garbage Collector Memory Accounting in Language-Based Systems
Language run-time systems are often called upon to safely execute mutually distrustful tasks within the same runtime, protecting them from other tasks’ bugs or otherwise hostile...
David W. Price, Algis Rudys, Dan S. Wallach
SOCIALCOM
2010
14 years 9 months ago
Failure Feedback for User Obligation Systems
In recent years, several researchers have proposed techniques for providing users with assistance in understanding and overcoming authorization denials. The incorporation of envir...
Murillo Pontual, Keith Irwin, Omar Chowdhury, Will...
CADE
1998
Springer
15 years 4 months ago
System Description: card TAP: The First Theorem Prover on a Smart Card
Abstract. We present the first implementation of a theorem prover running on a smart card. The prover is written in Java and implements a dual tableau calculus. Due to the limited ...
Rajeev Goré, Joachim Posegga, Andrew Slater...
ISESE
2005
IEEE
15 years 5 months ago
Managing software change tasks: an exploratory study
Programmers often have to perform change tasks that involve unfamiliar portions of a software system’s code base. To help inform the design of software development tools intende...
Jonathan Sillito, Kris De Volder, Brian Fisher, Ga...
EGOV
2005
Springer
15 years 5 months ago
Electronic Voting: An All-Purpose Platform
It is generally considered that a key component of electronic government in the future will be electronic voting, as a means of facilitating the participation of citizens in electi...
Ricardo André Costa, Mário Jorge Lei...