Sciweavers

4731 search results - page 74 / 947
» Securing Interactive Programs
Sort
View
OOPSLA
2000
Springer
14 years 12 days ago
An approach to safe object sharing
It is essential for security to be able to isolate mistrusting programs from one another, and to protect the host platform from programs. Isolation is difficult in object-oriented...
Ciarán Bryce, Chrislain Razafimahefa
IEEEARES
2007
IEEE
14 years 3 months ago
Secure Software Development through Coding Conventions and Frameworks
It is difficult to apply existing software development methods to security concerns. Using software for security testing purposes, in particular, is hard to do. The fact that ther...
Takao Okubo, Hidehiko Tanaka
SPW
2005
Springer
14 years 2 months ago
Experiences with Host-to-Host IPsec
This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the d...
Tuomas Aura, Michael Roe, Anish Mohammed
OOPSLA
1990
Springer
14 years 26 days ago
Type Substitution for Object-Oriented Programming
Genericity allows the substitution of types in a class. This is usually obtained through parameterized classes, although they are inflexible since any class can be inherited but i...
Jens Palsberg, Michael I. Schwartzbach
OOPSLA
1991
Springer
14 years 10 days ago
Developing a GUIDE Using Object-Oriented Programming
PICASSOis a graphical user interface development environment built using the Common Lisp Object System (CLOS). This paper describes how CLOS features including multiple inheritanc...
Joseph A. Konstan, Lawrence A. Rowe