Sciweavers

82 search results - page 6 / 17
» Privacy-Invasive Software and Preventive Mechanisms
Sort
View
ICCS
2003
Springer
14 years 3 months ago
Using Conceptual Graphs to Capture Semantics of Agent Communication
Agent communication languages such as KQML and the FIPA ACL serve as metalanguages to define software agent message-passing protocols. These metalanguages are incompatible with eac...
Lois W. Harper, Harry S. Delugach
WCRE
2009
IEEE
14 years 4 months ago
Tracking Design Smells: Lessons from a Study of God Classes
—“God class” is a term used to describe a certain type of large classes which “know too much or do too much”. Often a God class (GC) is created by accident as functionali...
Stéphane Vaucher, Foutse Khomh, Naouel Moha...
WWW
2007
ACM
14 years 10 months ago
Defeating script injection attacks with browser-enforced embedded policies
Web sites that accept and display content such as wiki articles or comments typically filter the content to prevent injected script code from running in browsers that view the sit...
Trevor Jim, Nikhil Swamy, Michael Hicks
DSN
2004
IEEE
14 years 1 months ago
Why PCs Are Fragile and What We Can Do About It: A Study of Windows Registry Problems
Software configuration problems are a major source of failures in computer systems. In this paper, we present a new framework for categorizing configuration problems. We apply thi...
Archana Ganapathi, Yi-Min Wang, Ni Lao, Ji-Rong We...
NDSS
2003
IEEE
14 years 3 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet