Sciweavers

123 search results - page 17 / 25
» Security and Source Code Access: Issues and Realities
Sort
View
WSE
2005
IEEE
14 years 8 days ago
A Comprehensive Model for Web Sites Quality
Many of existing criteria for evaluating web sites quality require methods such as heuristic evaluations, or/and empirical usability tests. This paper aims at defining a quality m...
Oreste Signore
ANSOFT
2002
171views more  ANSOFT 2002»
13 years 6 months ago
OPM/Web - Object-Process Methodology for Developing Web Applications
Web applications can be classified as hybrids between hypermedia and information systems. They have a relatively simple distributed architecture from the user viewpoint, but a comp...
Iris Reinhartz-Berger, Dov Dori, Shmuel Katz
USS
2008
13 years 9 months ago
NetAuth: Supporting User-Based Network Services
In User-Based Network Services (UBNS), the process servicing requests from user U runs under U's ID. This enables (operating system) access controls to tailor service authori...
Manigandan Radhakrishnan, Jon A. Solworth
KBSE
2007
IEEE
14 years 1 months ago
Effective memory protection using dynamic tainting
Programs written in languages that provide direct access to memory through pointers often contain memory-related faults, which may cause non-deterministic failures and even securi...
James A. Clause, Ioannis Doudalis, Alessandro Orso...
ACSAC
2007
IEEE
14 years 1 months ago
Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine
We have implemented an information flow framework for the Java Virtual Machine that combines static and dynamic techniques to capture not only explicit flows, but also implicit ...
Deepak Chandra, Michael Franz