Sciweavers

487 search results - page 65 / 98
» The Java System Dependence Graph
Sort
View
PLDI
2009
ACM
14 years 3 months ago
Catch me if you can: permissive yet secure error handling
Program errors are a source of information leaks. Tracking these leaks is hard because error propagation breaks out of program structure. Programming languages often feature excep...
Aslan Askarov, Andrei Sabelfeld
ICST
2009
IEEE
14 years 3 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry
IEEEPACT
2007
IEEE
14 years 2 months ago
Call-chain Software Instruction Prefetching in J2EE Server Applications
We present a detailed characterization of instruction cache performance for IBM’s J2EE-enabled web server, WebSphere Application Server (WAS). When running two J2EE benchmarks o...
Priya Nagpurkar, Harold W. Cain, Mauricio J. Serra...
IWMM
2007
Springer
85views Hardware» more  IWMM 2007»
14 years 2 months ago
Uniqueness inference for compile-time object deallocation
This paper presents an analysis and transformation for individual object reclamation in Java programs. First, we propose a uniqueness inference algorithm that identifies variable...
Sigmund Cherem, Radu Rugina
HT
1997
ACM
14 years 19 days ago
Designing Dexter-Based Hypermedia Services for the World Wide Web
This paper discusses how to augment the WWW with a Dexter-based hypermedia service that provides anchors, links and composites as objects stored external to the Web pages. The hyp...
Kaj Grønbæk, Niels Olof Bouvin, Lenne...