Sciweavers

90 search results - page 16 / 18
» Specifying Authentication Protocols Using Rewriting and Stra...
Sort
View
CORR
2010
Springer
174views Education» more  CORR 2010»
13 years 4 months ago
A Proof Carrying Code Framework for Inlined Reference Monitors in Java Bytecode
We propose a lightweight approach for certification of Java bytecode monitor inlining using proof-carrying code. The main purpose of such a framework is to enable development use ...
Mads Dam, Andreas Lundblad
SELMAS
2004
Springer
14 years 24 days ago
A Software Framework for Automated Negotiation
If agents are to negotiate automatically with one another they must share a negotiation mechanism, specifying what possible actions each party can take at any given time, when nego...
Claudio Bartolini, Chris Preist, Nicholas R. Jenni...
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
14 years 8 days ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that uniļ¬es a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speciļ...
William R. Marczak, Shan Shan Huang, Martin Braven...
ICSE
2004
IEEE-ACM
14 years 7 months ago
A Feature-Oriented Alternative to Implementing Reliability Connector Wrappers
Connectors and connector wrappers explicitly specify the protocol of interaction among components and afford the reusable application of extra-functional behaviors, such as reliabi...
J. H. Sowell, R. E. Kurt Stirewalt
PLDI
2003
ACM
14 years 21 days ago
Automatically proving the correctness of compiler optimizations
We describe a technique for automatically proving compiler optimizations sound, meaning that their transformations are always semantics-preserving. We ļ¬rst present a domainspeci...
Sorin Lerner, Todd D. Millstein, Craig Chambers