Sciweavers

359 search results - page 33 / 72
» Supporting Real World Security Models in Java
Sort
View
136
Voted
WWW
2004
ACM
16 years 3 months ago
Edgecomputing: extending enterprise applications to the edge of the internet
Content delivery networks have evolved beyond traditional distributed caching. With services such as Akamai's EdgeComputing it is now possible to deploy and run enterprise bu...
Andy Davis, Jay Parikh, William E. Weihl
127
Voted
IS
2006
15 years 2 months ago
The MurMur project: Modeling and querying multi-representation spatio-temporal databases
Successful information management implies the ability to design accurate representations of the real world of interest, in spite of the diversity of perceptions from the applicati...
Christine Parent, Stefano Spaccapietra, Esteban Zi...
81
Voted
ATAL
2005
Springer
15 years 8 months ago
A real-world approach to secure and trusted negotiation in MASs
The problem of providing tools to support legally valid negotiations between agents is becoming more and more critical. Agents are supposed to perform crucial tasks autonomously; ...
Roberto Bianchi, Andrea Fontana, Federico Bergenti
108
Voted
WWW
2010
ACM
15 years 8 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
117
Voted
ICSE
2007
IEEE-ACM
16 years 2 months ago
Ownership and Immutability Inference for UML-Based Object Access Control
We propose a mechanism for object access control which is based on the UML. Specifically, we propose use of ownership and immutability constraints on UML associations and verifica...
Yin Liu, Ana Milanova