Sciweavers

687 search results - page 113 / 138
» A Self-Policing Policy Language
Sort
View
CSEE
2000
Springer
14 years 21 hour ago
A Framework-Based Approach to Teaching OOT: Aims, Implementation, and Experience
We report on experience from teaching OO technology to undergraduate students. Before they can successfully tackle the projects they have to successfully shift to the OO paradigm,...
Birgit Demuth, Heinrich Hußmann, Steffen Zsc...
CSFW
1999
IEEE
14 years 3 hour ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
HOTOS
1999
IEEE
13 years 12 months ago
ISTORE: Introspective Storage for Data-Intensive Network Services
Today's fast-growing data-intensive network services place heavy demands on the backend servers that support them. This paper introduces ISTORE, an intelligent server archite...
Aaron B. Brown, David L. Oppenheimer, Kimberly Kee...
KBSE
2010
IEEE
13 years 6 months ago
Analyzing security architectures
We present a semi-automated approach, Secoria, for analyzing a security runtime architecture for security and for conformance to an object-oriented implementation. Typecheckable a...
Marwan Abi-Antoun, Jeffrey M. Barnes
GLOBECOM
2010
IEEE
13 years 5 months ago
Cache-Based Scalable Deep Packet Inspection with Predictive Automaton
Abstract--Regular expression (Regex) becomes the standard signature language for security and application detection. Deterministic finite automata (DFAs) are widely used to perform...
Yi Tang, Junchen Jiang, Xiaofei Wang, Yi Wang, Bin...