Sciweavers

1288 search results - page 101 / 258
» Securing aspect composition
Sort
View
JUCS
2010
159views more  JUCS 2010»
13 years 5 months ago
Developing a Secure Mobile Grid System through a UML Extension
: The idea of developing software through systematic development processes to improve software quality is not new. Nevertheless, there are still many information systems such as th...
David G. Rosado, Eduardo Fernández-Medina, ...
OOPSLA
2009
Springer
14 years 4 months ago
Debug all your code: portable mixed-environment debugging
Programmers build large-scale systems with multiple languages to reuse legacy code and leverage languages best suited to their problems. For instance, the same program may use Jav...
Byeongcheol Lee, Martin Hirzel, Robert Grimm, Kath...
OOPSLA
2010
Springer
13 years 8 months ago
Mostly modular compilation of crosscutting concerns by contextual predicate dispatch
The modularity of aspect-oriented programming (AOP) has been a controversial issue. To investigate this issue compared with object-oriented programming (OOP), we propose a simple ...
Shigeru Chiba, Atsushi Igarashi, Salikh Zakirov
ESORICS
2006
Springer
14 years 1 months ago
Secure Key-Updating for Lazy Revocation
Abstract. We consider the problem of efficient key management and user revocation in cryptographic file systems that allow shared access to files. A performanceefficient solution t...
Michael Backes, Christian Cachin, Alina Oprea
ESORICS
2007
Springer
14 years 4 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...