Sciweavers

386 search results - page 35 / 78
» Providing Fine-grained Access Control for Java Programs
Sort
View
HCW
1998
IEEE
15 years 6 months ago
On the Interaction between Mobile Processes and Objects
Java's remote method invocation mechanism provides a number of features that extend the functionality of traditional client server-based distributed systems. However, there a...
Suresh Jagannathan, Richard Kelsey
139
Voted
OOPSLA
2009
Springer
15 years 8 months ago
Debug all your code: portable mixed-environment debugging
Programmers build large-scale systems with multiple languages to reuse legacy code and leverage languages best suited to their problems. For instance, the same program may use Jav...
Byeongcheol Lee, Martin Hirzel, Robert Grimm, Kath...
SAC
2004
ACM
15 years 7 months ago
Web Services for E-commerce: guaranteeing security access and quality of service
Being E-commerce one of the most critical Internet application, it is fundamental to employ technologies which guarantee not only secure transactions but also an adequate quality ...
Mario Bravetti, Roberto Lucchi, Gianluigi Zavattar...
108
Voted
CUZA
2002
129views more  CUZA 2002»
15 years 1 months ago
Ad Hoc Metacomputing with Compeer
Metacomputing allows the exploitation of geographically seperate, heterogenous networks and resources. Most metacomputers are feature rich and carry a long, complicated installati...
Keith Power, John P. Morrison
142
Voted
CCS
2010
ACM
15 years 2 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...