Sciweavers

2062 search results - page 188 / 413
» Hardware Objects for Java
Sort
View
CSFW
2009
IEEE
14 years 4 months ago
Securing Timeout Instructions in Web Applications
Timeout mechanisms are a useful feature for web applications. However, these mechanisms need to be used with care because, if used as-is, they are vulnerable to timing attacks. Th...
Alejandro Russo, Andrei Sabelfeld
KBSE
2008
IEEE
14 years 4 months ago
A Generic Approach for Class Model Normalization
Designing and maintaining a huge class model is a very complex task. When an object oriented software or model becomes bigger and bigger, duplicated elements start to appear, decr...
Jean-Rémy Falleri, Marianne Huchard, Cl&eac...
ICOST
2007
Springer
14 years 3 months ago
Characterizing Safety of Integrated Services in Home Network System
This paper formalizes three kinds of safety to be satisfied by networked appliances and services in the emerging home network system (HNS). The local safety is defined by safety ...
Ben Yan, Masahide Nakamura, Lydie du Bousquet, Ken...
RULEML
2007
Springer
14 years 3 months ago
The OO jDREW Engine of Rule Responder: Naf Hornlog RuleML Query Answering
Abstract. Rule Responder is an intelligent multi-agent system for collaborative teams and virtual communities that uses RuleML as its rule interchange format. The system allows the...
Benjamin Larry Craig
CSFW
2006
IEEE
14 years 3 months ago
Noninterference in the Presence of Non-Opaque Pointers
A common theoretical assumption in the study of information flow security in Java-like languages is that pointers are opaque – i.e., that the only properties that can be observ...
Daniel Hedin, David Sands