Sciweavers

1949 search results - page 12 / 390
» Protective Interface Specifications
Sort
View
CCS
2008
ACM
13 years 9 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
MOBICOM
1997
ACM
13 years 11 months ago
A Protection Scheme for Mobile Agents on Java
: This paper describes a protection scheme for mobile agents implemented on a Java environment. In this scheme, access to objects is controlled by means of software capabilities th...
Daniel Hagimont, Leila Ismail
HCI
2007
13 years 9 months ago
WATCH-OVER HMI for Vulnerable Road Users' Protection
WATCH-OVER is a European project, aiming at the enhancement of road safety and the impairment of traffic accidents involving vulnerable road users (VRUs), such as pedestrians, bicy...
Katrin Meinken, Roberto Montanari, Mark Fowkes, An...
CSMR
1998
IEEE
13 years 11 months ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont
SEW
2003
IEEE
14 years 23 days ago
Applying Run-Time Monitoring to the Deep-Impact Fault Protection Engine
Run-time monitoring is a lightweight verification method whereby the correctness of a programs’ execution is verified at run-time using executable specifications. This paper des...
Doron Drusinsky, Garth Watney