Sciweavers

940 search results - page 109 / 188
» Rules and Strategies in Java
Sort
View
POLICY
2001
Springer
15 years 5 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
111
Voted
POPL
1999
ACM
15 years 4 months ago
JFlow: Practical Mostly-Static Information Flow Control
A promising technique for protecting privacy and integrity of sensitive data is to statically check information flow within programs that manipulate the data. While previous work...
Andrew C. Myers
OOPSLA
1999
Springer
15 years 4 months ago
Atlas: A Case Study in Building a Web-Based Learning Environment using Aspect-oriented Programming
The Advanced Teaching and Learning Academic Server (Atlas) is a software system that supports web-based learning. Students can register for courses, and can navigate through perso...
Mik Kersten, Gail C. Murphy
144
Voted
ECOOPW
1998
Springer
15 years 4 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
DEBS
2007
ACM
15 years 4 months ago
Concepts and models for typing events for event-based systems
Event-based systems are increasingly gaining widespread attention for applications that require integration with loosely coupled and distributed systems for time-critical business...
Szabolcs Rozsnyai, Josef Schiefer, Alexander Schat...