Sciweavers

8068 search results - page 34 / 1614
» Java Data Objects
Sort
View
ESORICS
2010
Springer
13 years 12 months ago
Enforcing Secure Object Initialization in Java
Sun and the CERT recommend for secure Java development to not allow partially initialized objects to be accessed. The CERT considers the severity of the risks taken by not followin...
Laurent Hubert, Thomas P. Jensen, Vincent Monfort,...
ECOOP
1998
Springer
14 years 3 months ago
Object-Oriented Architectural Support for a Java Processor
In this paper, we propose architectural support for object manipulation, stack processing and method invocation to enhance the execution speed of Java bytecodes. First, a virtual a...
Narayanan Vijaykrishnan, N. Ranganathan, Ravi Gade...
SACMAT
2010
ACM
14 years 3 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
ER
1998
Springer
123views Database» more  ER 1998»
14 years 3 months ago
From Object Oriented Conceptual Modeling to Automated Programming in Java
The development of Internet commercial applications and corporate Intranets around the world, which uses Java as the de facto standard language, is a significant topic in modern S...
Oscar Pastor, Vicente Pelechano, Emilio Insfr&aacu...
ISORC
2005
IEEE
14 years 4 months ago
Object-Reuse for More Predictable Real-Time Java Behavior
One of the problems with Java for real-time systems is the unpredictable behavior of garbage collection (GC). GC introduces unexpected load and causes undesirable delays for real-...
Jameela Al-Jaroodi, Nader Mohamed