Sciweavers

386 search results - page 39 / 78
» Providing Fine-grained Access Control for Java Programs
Sort
View
INFOCOM
2006
IEEE
15 years 8 months ago
Fault-Tolerant Wireless Access Network Design for Dual-Homed Users
— In this paper, we study the survivability problem in hierarchical wireless access networks with dual-homed end users, who are connected to two base stations (BSs), a primary BS...
Xiaodong Huang, Jianping Wang, Vinod Vokkarane, Ja...
108
Voted
JOT
2006
73views more  JOT 2006»
15 years 1 months ago
The Initium RJS ScreenSaver: Part 2, UNIX
This paper describes a Java-based screensaver technology for the Initium Remote Job Submission (RJS) system running on UNIX XWindows. Initium RJS is a Java Web Start (JAWS) techno...
Douglas A. Lyon, Francisco Castellanos
CADE
2005
Springer
16 years 2 months ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin
118
Voted
ISSTA
2006
ACM
15 years 7 months ago
The case for analysis preserving language transformation
Static analysis has gained much attention over the past few years in applications such as bug finding and program verification. As software becomes more complex and componentize...
Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Web...
ESSOS
2010
Springer
15 years 10 months ago
Experiences with PDG-Based IFC
Information flow control systems provide the guarantees that are required in today’s security-relevant systems. While the literature has produced a wealth of techniques to ensur...
Christian Hammer