Sciweavers

5252 search results - page 866 / 1051
» Logic in Access Control
Sort
View
ECOOP
2005
Springer
15 years 10 months ago
Towards Type Inference for JavaScript
Object-oriented scripting languages like JavaScript and Python are popular partly because of their dynamic features. These include the runtime modification of objects and classes ...
Christopher Anderson, Paola Giannini, Sophia Dross...
EDO
2005
Springer
15 years 10 months ago
Optimizing layered middleware
Middleware is often built using a layered architectural style. Layered design provides good separation of the different concerns of middleware, such as communication, marshaling, ...
Ömer Erdem Demir, Premkumar T. Devanbu, Eric ...
HIPEAC
2005
Springer
15 years 10 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
ICN
2005
Springer
15 years 10 months ago
Securing Layer 2 in Local Area Networks
Abstract. Network security problems have been well known and addressed in the application, transport, or network layers. However, the Data Link Layer (Layer 2) security has not bee...
Hayriye Altunbasak, Sven Krasser, Henry L. Owen, J...
ICN
2005
Springer
15 years 10 months ago
MiSC: A New Availability Remote Storage System for Mobile Appliance
Abstract. The continued growth of both mobile appliances and wireless Internet technologies is bringing a new telecommunication revolution and has extended the demand of various se...
Joo-Ho Kim, Bo-Seok Moon, Myong-Soon Park