Sciweavers

258 search results - page 27 / 52
» Portable secure identity management for software engineering
Sort
View
COMPSAC
2005
IEEE
14 years 2 months ago
Using Aspect Oriented Techniques to Support Separation of Concerns in Model Driven Development
Model driven development (MDD) tackles software complexity through the use of models. However, managing relationships and specifying transformations models at various levels of ab...
Arnor Solberg, Devon M. Simmonds, Raghu Reddy, Sud...
SAC
2005
ACM
14 years 2 months ago
A generic serializer for mobile devices
In this paper we describe a serializer component completely realized in .NET managed code, able to run on a stripped versions of the .NET platform (e.g., Compact Framework) and st...
Mattia Monga, Angelo Scotto
CCS
2010
ACM
13 years 6 months ago
Adjustable autonomy for cross-domain entitlement decisions
Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially...
Jacob Beal, Jonathan Webb, Michael Atighetchi
WORM
2003
13 years 9 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
DRM
2007
Springer
14 years 2 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...