Sciweavers

247 search results - page 27 / 50
» Information hiding for trusted system design
Sort
View
MIDDLEWARE
2004
Springer
14 years 27 days ago
On the benefits of decomposing policy engines into components
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. However, application developers and ...
Konstantin Beznosov
EUROSYS
2008
ACM
14 years 4 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
AIS
2004
Springer
14 years 28 days ago
Proposal of High Level Architecture Extension
The paper proposes three dimensional extension to High Level ARchitecture (HLA) and Runtime Infrastructure (RTI) to solve several issues such as security, information hiding proble...
Jae-Hyun Kim, Tag Gon Kim
ECOOP
1997
Springer
13 years 11 months ago
Subtyping Is Not a Good "Match" for Object-Oriented Languages
We present the design and rationale of a new statically-typed object-oriented language, LOOM. LOOM retains most of the features of the earlier language PolyTOIL. However the subtyp...
Kim B. Bruce, Leaf Petersen, Adrian Fiech
JSS
2000
83views more  JSS 2000»
13 years 7 months ago
Module interconnection features in object-oriented development tools
The black-box reuse of library classes in the construction of an object-oriented (OO) application is dicult: the principle of information hiding may be violated if classes must kn...
Sergio E. R. de Carvalho, Julio Cesar Sampaio do P...