Sciweavers

2056 search results - page 82 / 412
» Mobile objects in Java
Sort
View
QSIC
2006
IEEE
15 years 8 months ago
PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application
Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the syst...
Haruhiko Kaiya, Kouta Sasaki, Kenji Kaijiri
135
Voted
ESORICS
2000
Springer
15 years 6 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
131
Voted
DEXA
2006
Springer
139views Database» more  DEXA 2006»
15 years 6 months ago
Distributed Continuous Range Query Processing on Moving Objects
Recent work on continuous queries has focused on processing queries in very large, mobile environments. In this paper, we propose a system leveraging the computing capacities of mo...
Haojun Wang, Roger Zimmermann, Wei-Shinn Ku
114
Voted
ECOOP
2005
Springer
15 years 8 months ago
First-Class Relationships in an Object-Oriented Language
In this paper we investigate the addition of first-class relationships to a prototypical object-oriented programming language (a “middleweight” fragment of Java). We provide ...
Gavin M. Bierman, Alisdair Wren
130
Voted
CBSE
2010
Springer
15 years 7 months ago
Restructuring Object-Oriented Applications into Component-Oriented Applications by Using Consistency with Execution Traces
Abstract. Software systems should evolve in order to respond to changing client requirements and their evolving environments. But unfortunately, the evolution of legacy application...
Simon Allier, Houari A. Sahraoui, Salah Sadou, St&...