The boundary between application and system is becoming increasingly permeable. Extensible applications, such as web browsers, database systems, and operating systems, demonstrate...
CSCL practice and dissemination are problematic due to the lack of technical and pedagogical expertise, concrete training, and support for teachers. This paper describes a technol...
Security concerns on embedded devices like cellular phones make Java an extremely attractive technology for providing third-party and user-downloadable functionality. However, gar...
We define and demonstrate an approach to securing distributed computation based on a shared reference monitor (Shamon) that enforces mandatory access control (MAC) policies acros...
Jonathan M. McCune, Trent Jaeger, Stefan Berger, R...
Executable UML allows precisely describing the softtem at a higher level of abstraction. It bridges the semantics gap between the UML design models and the implementation. The exe...