Sciweavers

359 search results - page 5 / 72
» Supporting Real World Security Models in Java
Sort
View
63
Voted
JECR
2000
85views more  JECR 2000»
14 years 9 months ago
Real-Time Multi-Auctions and the Agent-Support
Electronic auctions have become popular. Recently, multicast technology is changing the Internet environment for e-commerce, and will make available more forms of auctions than we...
Hong Liu, Shouhong Wang, Fei Teng
PST
2008
14 years 11 months ago
Model-Checking for Software Vulnerabilities Detection with Multi-Language Support
In this paper we develop a security verification framework for open source software with a multi-language support. We base our approach on the GCC compiler which is considered as ...
Rachid Hadjidj, Xiaochun Yang, Syrine Tlili, Moura...
SIGOPSE
1998
ACM
15 years 1 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau
IH
2001
Springer
15 years 1 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
WCRE
2006
IEEE
15 years 3 months ago
How Programs Represent Reality (and how they don't)
Programming is modeling the reality. Most of the times, the mapping between source code and the real world concepts is captured implicitly in the names of identifiers. Making the...
Daniel Ratiu, Florian Deissenboeck