Sciweavers

690 search results - page 104 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
134
Voted
CCS
2009
ACM
16 years 4 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
PLDI
2011
ACM
14 years 6 months ago
Language-independent sandboxing of just-in-time compilation and self-modifying code
When dealing with dynamic, untrusted content, such as on the Web, software behavior must be sandboxed, typically through use of a language like JavaScript. However, even for such ...
Jason Ansel, Petr Marchenko, Úlfar Erlingss...
141
Voted
ATAL
2006
Springer
15 years 5 months ago
ReAgents: behavior-based remote agents and their performance
We present a performance analysis of an agent-based middleware system we have developed based on "reAgents," remotely executing agents that enhance the performance of cl...
Eugene Hung, Joseph Pasquale
115
Voted
APSEC
2005
IEEE
15 years 9 months ago
Consistency and Interoperability Checking for Component Interaction Rules
In component-based software development, it is important to ensure interoperability between components based on their unambiguous semantic descriptions, in order to obtain a viabl...
Yan Jin, Jun Han
124
Voted
CASES
2010
ACM
15 years 1 months ago
Instruction selection by graph transformation
Common generated instruction selections are based on tree pattern matching, but modern and custom architectures feature instructions, which cannot be covered by trees. To overcome...
Sebastian Buchwald, Andreas Zwinkau