Sciweavers

1288 search results - page 140 / 258
» Securing aspect composition
Sort
View
FTDCS
1997
IEEE
14 years 2 months ago
Intrusion ripple analysis in distributed information systems
: Security is a very important aspect of distributed computing systems, especially in distributed information environments involving widearea networks, such as internets. In this p...
S. S. Yau, Jun Zhu
OOPSLA
1992
Springer
14 years 2 months ago
Concurrency Annotations
JAC is a Java extension for high-level concurrent programming, meant to hide the notions of threads and synchronization statements from the programmer. Putting into practice the c...
Klaus-Peter Löhr
EUROPKI
2008
Springer
14 years 5 days ago
A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System
Real world healthcare systems are generally large and overly complex systems. Designing privacy-friendly protocols for such systems is a challenging task. In this paper we present ...
Bart De Decker, Mohamed Layouni, Hans Vangheluwe, ...
ICMB
2005
IEEE
101views Business» more  ICMB 2005»
14 years 4 months ago
Mobile Ticketing System Employing TrustZone Technology
Security in mobile commerce is becoming more important due to increasing demand from users wishing to perform online transactions over mobile devices. Security is one of the criti...
Wan Huzaini Wan Hussin, Paul Coulton, Reuben Edwar...
IAW
2003
IEEE
14 years 3 months ago
Insecure Programming: How Culpable is a Language's Syntax?
— Vulnerabilities in software stem from poorly written code. Inadvertent errors may creep in due to programmers not being aware of the security implications of their code. Writin...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...