Sciweavers

2429 search results - page 267 / 486
» Using Aspects to Design a Secure System
Sort
View
136
Voted
DASFAA
2009
IEEE
195views Database» more  DASFAA 2009»
15 years 10 months ago
The XMLBench Project: Comparison of Fast, Multi-platform XML libraries
The XML technologies have brought a lot of new ideas and abilities in the field of information management systems. Nowadays, XML is used almost everywhere: from small configurati...
Suren Chilingaryan
113
Voted
ICCS
2003
Springer
15 years 8 months ago
Method Call Acceleration in Embedded Java Virtual Machines
Object oriented languages, in particular Java, use a frequent dynamic dispatch mechanism to search for the definition of an invoked method. A method could be defined in more than...
Mourad Debbabi, M. M. Erhioui, Lamia Ketari, Nadia...
EFDBS
2000
15 years 4 months ago
HERA: Automatically Generating Hypermedia Front-ends
The generation of hypermedia (or Web-based) presentations plays an important role in information management on the World Wide Web. In applications for Web modeling and querying, in...
Geert-Jan Houben
133
Voted
ACSAC
2007
IEEE
15 years 9 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...
SACMAT
2003
ACM
15 years 8 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck