Sciweavers

2257 search results - page 232 / 452
» Secure program partitioning
Sort
View
93
Voted
OOPSLA
1989
Springer
15 years 4 months ago
A Denotational Semantics of Inheritance and its Correctness
This paper presents a denotational model of inheritance. The model is based on an intuitive motivation of inheritance as a mechanism for deriving modified versions of recursive d...
William R. Cook, Jens Palsberg
90
Voted
ESORICS
2006
Springer
15 years 4 months ago
Discretionary Capability Confinement
Motivated by the need of application-level access control in dynamically extensible systems, this work proposes a static annotation system for modeling capabilies in a Java-like pr...
Philip W. L. Fong
105
Voted
DAGSTUHL
1998
15 years 2 months ago
Two Ways to Bake Your Pizza - Translating Parameterised Types into Java
We have identified in previous work two translations for parametrically typed extensions of Java. The homogeneous translation maps type variables to a uniform representation, while...
Martin Odersky, Enno Runne, Philip Wadler
OOPSLA
2010
Springer
14 years 11 months ago
Modular logic metaprogramming
In logic metaprogramming, programs are not stored as plain textfiles but rather derived from a deductive database. While the benefits of this approach for metaprogramming are ob...
Karl Klose, Klaus Ostermann
SICHERHEIT
2010
14 years 10 months ago
CAPTCHAs: The Good, the Bad, and the Ugly
A CAPTCHA is a program that generates challenges that are easy to solve for humans but difficult to solve for computers. The most common CAPTCHAs today are text-based ones where a ...
Paul Baecher, Marc Fischlin, Lior Gordon, Robert L...