Sciweavers

323 search results - page 10 / 65
» Security Analysis of Mobile Java
Sort
View
OOPSLA
2007
Springer
15 years 3 months ago
The JastAdd extensible Java compiler
We have implemented intraprocedural control-flow and data-flow analysis of Java source code in a declarative manner, using reference attribute grammars augmented with circular a...
Torbjörn Ekman, Görel Hedin
79
Voted
SCAM
2005
IEEE
15 years 3 months ago
Static Analysis for Computing Escapability and Mutability for Java Components
A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
Aiwu Shi, Gleb Naumovich
ISCC
2000
IEEE
125views Communications» more  ISCC 2000»
15 years 2 months ago
Security Requirements for Management Systems Using Mobile Agents
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive...
Helmut Reiser, Gerald Vogt
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
15 years 3 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
IWPC
2009
IEEE
15 years 4 months ago
Practical static analysis for inference of security-related program properties
We present a static analysis framework for inference of security-related program properties. Within this framework we design and implement ownership, immutability and information ...
Yin Liu, Ana Milanova