Sciweavers

579 search results - page 102 / 116
» Access control management for ubiquitous computing
Sort
View
EDO
2005
Springer
14 years 1 months ago
Optimizing layered middleware
Middleware is often built using a layered architectural style. Layered design provides good separation of the different concerns of middleware, such as communication, marshaling, ...
Ömer Erdem Demir, Premkumar T. Devanbu, Eric ...
DSN
2002
IEEE
14 years 23 days ago
Transactional Rollback for Language-Based Systems
Language run-time systems are routinely used to host potentially buggy or malicious codelets — software modules, agents, applets, etc. — in a secure environment. A number of t...
Algis Rudys, Dan S. Wallach
MMMACNS
2001
Springer
14 years 7 days ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
NSDI
2007
13 years 10 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
ENTCS
2007
118views more  ENTCS 2007»
13 years 7 months ago
Safe Adaptation of Component Coordination
In the domain of software engineering, the use of software components is now a well established approach. However, it raises problems about the dynamic adaptation of these compone...
Christophe Sibertin-Blanc, Philippe Mauran, G&eacu...