Sciweavers

1748 search results - page 151 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
DRM
2007
Springer
15 years 9 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
EMSOFT
2005
Springer
15 years 8 months ago
Passive mid-stream monitoring of real-time properties
Passive monitoring or testing of complex systems and networks running in the field can provide valuable insights into their behavior in actual environments of use. In certain con...
Lalita Jategaonkar Jagadeesan, Ramesh Viswanathan
EGC
2005
Springer
15 years 8 months ago
Security Architecture for Open Collaborative Environment
Abstract. The paper presents proposed Security Architecture for Open Collaborative Environment (OCE) being developed in the framework of the Collaboratory.nl (CNL) project with the...
Yuri Demchenko, Leon Gommans, Cees de Laat, Bas va...
JUCS
2006
98views more  JUCS 2006»
15 years 3 months ago
Modern Technologies in Client-Server Architecture for Geo-based Interactive Web Portals
: The internet is an unlimited growing and most comfortable information and communication base. In this context, web portals on the internet play an important role created for comb...
Pawel Gocek, Michael Hartmann, Heinz Schleusener
SIGECOM
2005
ACM
113views ECommerce» more  SIGECOM 2005»
15 years 8 months ago
Dynamic and secure B2B e-contract update management
Business-to-business electronic contracts provide a specification of the agreed value exchange and guarantee legal protection to companies during electronic trading relations. Imp...
Samuil Angelov, Sven Till, Paul W. P. J. Grefen