Sciweavers

386 search results - page 23 / 78
» Providing Fine-grained Access Control for Java Programs
Sort
View
118
Voted
AOSD
2003
ACM
15 years 7 months ago
Aspect-oriented programming with Jiazzi
We present aspect-oriented programming in Jiazzi. Jiazzi enhances Java with separately compiled, externally-linked code modules called units. Besides making programming in Java ge...
Sean McDirmid, Wilson C. Hsieh
PEPM
2010
ACM
15 years 10 months ago
PET: a partial evaluation-based test case generation tool for Java bytecode
PET is a prototype Partial Evaluation-based Test case generation tool for a subset of Java bytecode programs. It performs white-box test generation by means of two consecutive Par...
Elvira Albert, Miguel Gómez-Zamalloa, Germ&...
ICST
2009
IEEE
15 years 8 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry
BMCBI
2007
195views more  BMCBI 2007»
15 years 1 months ago
NeuroTerrain - a client-server system for browsing 3D biomedical image data sets
Background: Three dimensional biomedical image sets are becoming ubiquitous, along with the canonical atlases providing the necessary spatial context for analysis. To make full us...
Carl Gustafson, William J. Bug, Jonathan Nissanov
COMPSAC
2010
IEEE
14 years 11 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...