Sciweavers

832 search results - page 131 / 167
» Mutation of Java Objects
Sort
View
SPC
2005
Springer
14 years 1 months ago
A Theorem Proving Approach to Analysis of Secure Information Flow
Abstract. Most attempts at analysing secure information flow in programs are based on domain-specific logics. Though computationally feahese approaches suffer from the need for ...
Ádám Darvas, Reiner Hähnle, Dav...
GPCE
2004
Springer
14 years 1 months ago
A Fresh Calculus for Name Management
Abstract. We define a basic calculus for name management, which is obtained by an appropriate combination of three ingredients: extensible records (in a simplified form), names (...
Davide Ancona, Eugenio Moggi
ICCS
2004
Springer
14 years 1 months ago
Multiparadigm Model Oriented to Development of Grid Systems
Multiparadigm approach integrates programming language paradigms. We propose Holoparadigm (Holo) as a multiparadigm model oriented to development of grid systems. Holo uses a logi...
Jorge L. V. Barbosa, Cristiano André da Cos...
ACSC
2002
IEEE
14 years 1 months ago
Bracket Capabilities for Distributed Systems Security
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
Mark Evered
WCRE
2002
IEEE
14 years 1 months ago
Program Annotation in XML: A Parse-Tree Based Approach
In this paper we describe a technique that can be used to annotate source code with syntactic tags in XML format. This is achieved by modifying the parser generator bison to emit ...
James F. Power, Brian A. Malloy