Sciweavers

2257 search results - page 232 / 452
» Secure program partitioning
Sort
View
OOPSLA
1989
Springer
14 years 2 months ago
A Denotational Semantics of Inheritance and its Correctness
This paper presents a denotational model of inheritance. The model is based on an intuitive motivation of inheritance as a mechanism for deriving modified versions of recursive d...
William R. Cook, Jens Palsberg
ESORICS
2006
Springer
14 years 2 months ago
Discretionary Capability Confinement
Motivated by the need of application-level access control in dynamically extensible systems, this work proposes a static annotation system for modeling capabilies in a Java-like pr...
Philip W. L. Fong
DAGSTUHL
1998
14 years 3 hour ago
Two Ways to Bake Your Pizza - Translating Parameterised Types into Java
We have identified in previous work two translations for parametrically typed extensions of Java. The homogeneous translation maps type variables to a uniform representation, while...
Martin Odersky, Enno Runne, Philip Wadler
OOPSLA
2010
Springer
13 years 9 months ago
Modular logic metaprogramming
In logic metaprogramming, programs are not stored as plain textfiles but rather derived from a deductive database. While the benefits of this approach for metaprogramming are ob...
Karl Klose, Klaus Ostermann
SICHERHEIT
2010
13 years 8 months ago
CAPTCHAs: The Good, the Bad, and the Ugly
A CAPTCHA is a program that generates challenges that are easy to solve for humans but difficult to solve for computers. The most common CAPTCHAs today are text-based ones where a ...
Paul Baecher, Marc Fischlin, Lior Gordon, Robert L...