Sciweavers

1748 search results - page 272 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
COOTS
1998
15 years 3 months ago
The Design and Performance of MedJava
The Java programming language has gained substantial popularity in the past two years. Java's networking features, along with the growing number of Web browsers that execute J...
Prashant Jain, Seth Widoff, Douglas C. Schmidt
SOUPS
2005
ACM
15 years 7 months ago
Stopping spyware at the gate: a user study of privacy, notice and spyware
Spyware is a significant problem for most computer users. The term “spyware” loosely describes a new class of computer software. This type of software may track user activitie...
Nathaniel Good, Rachna Dhamija, Jens Grossklags, D...
CADE
2002
Springer
16 years 2 months ago
A Gradual Approach to a More Trustworthy, Yet Scalable, Proof-Carrying Code
Abstract. Proof-carrying code (PCC) allows a code producer to associate to a program a machine-checkable proof of its safety. In the original approach to PCC, the safety policy inc...
Robert R. Schneck, George C. Necula
IEEESCC
2006
IEEE
15 years 8 months ago
Applying Distributed Business Rules - The VIDRE Approach
Today’s business processes are not static, they need to be adapted frequently to reflect changing business requirements. Several business process languages such as WS-BPEL have...
Florian Rosenberg, Christoph Nagl, Schahram Dustda...
OOPSLA
2004
Springer
15 years 7 months ago
Finding bugs is easy
Many techniques have been developed over the years to automatically find bugs in software. Often, these techniques rely on formal methods and sophisticated program analysis. Whil...
David Hovemeyer, William Pugh