Sciweavers

323 search results - page 14 / 65
» Security Analysis of Mobile Java
Sort
View
INFOCOM
2006
IEEE
15 years 3 months ago
Supporting Secure Communication and Data Collection in Mobile Sensor Networks
— Sensor deployments may be static, but researchers have recently been making a case for mobile collector nodes to enhance data acquisition. Since mobile nodes are often more pri...
Li Zhou, Jinfeng Ni, Chinya V. Ravishankar
ACSD
2003
IEEE
125views Hardware» more  ACSD 2003»
15 years 2 months ago
Modelling a Secure, Mobile, and Transactional System with CO-OPN
Modelling complex concurrent systems is often difficult and error-prone, in particular when new concepts coming from advanced practical applications are considered. These new appl...
Didier Buchs, Stanislav Chachkov, David Hurzeler
ACSAC
2005
IEEE
15 years 3 months ago
Privacy Requirements Implemented with a JavaCard
Privacy is extremely important in healthcare systems. Unfortunately, most of the solutions already deployed are developed empirically. After discussing some of such existing solut...
Anas Abou El Kalam, Yves Deswarte
ISSTA
2006
ACM
15 years 3 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
OOPSLA
1999
Springer
15 years 1 months ago
Removing Unnecessary Synchronization in Java
Java programs perform many synchronization operations on data structures. Some of these synchronizations are unnecessary; in particular, if an object is reachable only by a single ...
Jeff Bogda, Urs Hölzle