Sciweavers

323 search results - page 21 / 65
» Security Analysis of Mobile Java
Sort
View
93
Voted
USM
2000
15 years 1 months ago
Trade-offs in a Secure Jini Service Architecture
Jini is an infrastructure built on top of the mobile code facilities of the Java programming language enabling clients and services to spontaneously engage in arbitrary usage scena...
Peer Hasselmeyer, Roger Kehr, Marco Voß
CATA
2003
14 years 11 months ago
A Restaurant Finder using Belief-Desire-Intention Agent Model and Java Technology
It is becoming more important to design systems capable of performing high-level management and control tasks in interactive dynamic environments. At the same time, it is difficul...
Dongqing Lin, Thomas P. Wiggen, Chang-Hyun Jo
IJNSEC
2008
110views more  IJNSEC 2008»
14 years 9 months ago
Security Measures and Weaknesses of the GPRS Security Architecture
This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect th...
Christos Xenakis
APLAS
2008
ACM
14 years 11 months ago
JavaScript Instrumentation in Practice
JavaScript has been exploited to launch various browser-based attacks. Our previous work proposed a theoretical framework applying policy-based code instrumentation to JavaScript. ...
Haruka Kikuchi, Dachuan Yu, Ajay Chander, Hiroshi ...
TACAS
2004
Springer
108views Algorithms» more  TACAS 2004»
15 years 3 months ago
The Succinct Solver Suite
Abstract. The Succinct Solver Suite offers two analysis engines for solving data and control flow problems expressed in clausal form in a large fragment of first order logic. Th...
Flemming Nielson, Hanne Riis Nielson, Hongyan Sun,...