Sciweavers

3486 search results - page 83 / 698
» On the Design and Security of RC2
Sort
View
OOPSLA
2010
Springer
14 years 9 months ago
Modular logic metaprogramming
In logic metaprogramming, programs are not stored as plain textfiles but rather derived from a deductive database. While the benefits of this approach for metaprogramming are ob...
Karl Klose, Klaus Ostermann
GIL
2010
14 years 9 months ago
Light Competition in Chinese Cabbage/Maize Strip Intercropping Systems
: Due to drastic socio-economic changes traditional intercropping systems in China are endangered. New high yielding intercropping systems that can easily be mechanized have to be ...
Til Feike, Sebastian Munz, Simone Graeff-Hönn...
SIGSOFT
2010
ACM
14 years 9 months ago
Embracing policy engineering
Declarative policies play a central role in many modern software systems. Engineering policies and their interactions with programs raises many interesting open questions. Categor...
Kathi Fisler, Shriram Krishnamurthi, Daniel J. Dou...
SWS
2005
ACM
15 years 4 months ago
Web services enterprise security architecture: a case study
Web Services (WS hereafter) Security is a crucial aspect for technologies based on this paradigm to be completely adopted by the industry. As a consequence, a lot of initiatives h...
Carlos Gutiérrez, Eduardo Fernández-...
ACSAC
2003
IEEE
15 years 4 months ago
PSOS Revisited
This paper provides a retrospective view of the design of SRI’s Provably Secure Operating System (PSOS), a formally specified tagged-capability hierarchical system architecture...
Peter G. Neumann, Richard J. Feiertag