Sciweavers

488 search results - page 32 / 98
» Derivation of Java Monitors
Sort
View
SACMAT
2010
ACM
15 years 7 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
ISORC
2005
IEEE
15 years 8 months ago
Heterogeneous Adaptive Component-Based Applications with Adaptive.Net
Adaptation to changing environmental conditions is a major challenge for most distributed applications. The service-oriented programming paradigm leads to an increasing number of ...
Andreas Rasche, Marco Puhlmann, Andreas Polze
106
Voted
KDD
1997
ACM
184views Data Mining» more  KDD 1997»
15 years 6 months ago
JAM: Java Agents for Meta-Learning over Distributed Databases
In this paper, we describe the JAM system, a distributed, scalable and portable agent-based data mining system that employs a general approach to scaling data mining applications ...
Salvatore J. Stolfo, Andreas L. Prodromidis, Shell...
CSFW
2009
IEEE
15 years 9 months ago
Securing Timeout Instructions in Web Applications
Timeout mechanisms are a useful feature for web applications. However, these mechanisms need to be used with care because, if used as-is, they are vulnerable to timing attacks. Th...
Alejandro Russo, Andrei Sabelfeld
115
Voted
ICALT
2006
IEEE
15 years 8 months ago
Agency Architecture for Teacher Intervention in Robotics Classes
Teachers working in robotics classes face a major problem: how to keep track on individual students’ or even small groups’ progress in a class of 30-40 students. An agency app...
Ilkka Jormanainen, Yuejun Zhang, Erkki Sutinen, Ki...