Sciweavers

2257 search results - page 160 / 452
» Secure program partitioning
Sort
View
108
Voted
DEXA
2005
Springer
110views Database» more  DEXA 2005»
15 years 8 months ago
Intensional Encapsulations of Database Subsets via Genetic Programming
Finding intensional encapsulations of database subsets is the inverse of query evaluation. Whereas query evaluation transforms an intensional expression (the query) to its extensi...
Aybar C. Acar, Amihai Motro
OOPSLA
2005
Springer
15 years 8 months ago
Interaction-based programming with classages
This paper presents Classages, a novel interaction-centric object-oriented language. Classes and objects in Classages are fully encapsulated, with explicit interfaces for all inte...
Yu David Liu, Scott F. Smith
DBPL
2009
Springer
131views Database» more  DBPL 2009»
15 years 9 months ago
XML Security Views Revisited
In this paper, we revisit the view based security framework for XML without imposing any of the previously considered restrictions on the class of queries, the class of DTDs, and t...
Benoît Groz, Slawomir Staworko, Anne-C&eacut...
IFIP
2009
Springer
15 years 9 months ago
Towards a Type System for Security APIs
Security API analysis typically only considers a subset of an API’s functions, with results bounded by the number of function calls. Furthermore, attacks involving partial leakag...
Gavin Keighren, David Aspinall, Graham Steel
IEEEARES
2006
IEEE
15 years 8 months ago
Secure and Reliable Java-Based Middleware - Challenges and Solutions
Java and the Java Virtual Machine (JVM) are a predominant programming language and deployment platform for complex, component-oriented systems. In current standard Java runtime sy...
Walter Binder