Sciweavers

1790 search results - page 295 / 358
» On Privacy Models for RFID
Sort
View
120
Voted
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
15 years 9 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick
156
Voted
OOPSLA
2005
Springer
15 years 9 months ago
SDD: high performance code clone detection system for large scale source code
Code clones in software increase maintenance cost and lower software quality. We have devised a new algorithm to detect duplicated parts of source code in large software. Our algo...
Seunghak Lee, Iryoung Jeong
OOPSLA
2005
Springer
15 years 9 months ago
Interaction-based programming with classages
This paper presents Classages, a novel interaction-centric object-oriented language. Classes and objects in Classages are fully encapsulated, with explicit interfaces for all inte...
Yu David Liu, Scott F. Smith
119
Voted
IFIP
2004
Springer
15 years 8 months ago
Decidability of Opacity with Non-Atomic Keys
The most studied property, secrecy, is not always sufficient to prove the security of a protocol. Other properties such as anonymity, privacy or opacity could be useful. Here, we u...
Laurent Mazaré
121
Voted
OOPSLA
2004
Springer
15 years 8 months ago
An aspect-oriented generative approach
Generative programming and aspect-oriented software development have been proposed over the last years aiming at increasing maintainability and reusability of software systems. Wh...
Uirá Kulesza, Alessandro F. Garcia, Carlos ...