Sciweavers

1519 search results - page 272 / 304
» Authentication for Mobile Agents
Sort
View
ICALP
2003
Springer
14 years 3 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
COOPIS
2000
IEEE
14 years 2 months ago
An Evaluation of the Java-Based Approaches to Web Database Access
Given the undeniable popularity of the Web, providing efficient and secure access to remote databases using a Web browser is crucial for the emerging cooperative information system...
Stavros Papastavrou, Panos K. Chrysanthis, George ...
POPL
2000
ACM
14 years 2 months ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
WOSP
2000
ACM
14 years 2 months ago
A pattern-based approach to model software performance
In this paper we present a formal approach to analyse performance for distributed systems, which is integrated in the early stages of the software development process. We propose ...
José Merseguer, Javier Campos, Eduardo Mena
ECOOP
2000
Springer
14 years 2 months ago
Ionic Types
Abstract. We are interested in the class of systems for which the satisfaction of code dependencies is a dynamic process rather than one which is determined purely at load-time. Ex...
Simon A. Dobson, Brian Matthews