Sciweavers

2517 search results - page 86 / 504
» Secure Deployment of Components
Sort
View
ECOOP
2005
Springer
15 years 9 months ago
Loosely-Separated "Sister" Namespaces in Java
Most modern programming systems such as Java allow us to link independently developed components together dynamically. This makes it possible to develop and deploy software on a pe...
Yoshiki Sato, Shigeru Chiba
108
Voted
WWW
2002
ACM
16 years 4 months ago
Certified email with a light on-line trusted third party: design and implementation
This paper presents a new protocol for certified email. The protocol aims to combine security, scalability, easy implementation, and viable deployment. The protocol relies on a li...
Martín Abadi, Neal Glew
121
Voted
ISNN
2005
Springer
15 years 9 months ago
Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier
As a crucial issue in computer network security, anomaly detection is receiving more and more attention from both application and theoretical point of view. In this paper, a novel ...
Hanghang Tong, Chongrong Li, Jingrui He, Jiajian C...
OOPSLA
2007
Springer
15 years 9 months ago
DigitalAssets discoverer: automatic identification of reusable software components
DigitalAssets Discoverer is a tool that implements a group of indicators for automatic identification of software components that can be reused in the development of new applicati...
Eduardo Machado Gonçalves, Marcilio Silva O...
HIPEAC
2005
Springer
15 years 9 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee