Sciweavers

2429 search results - page 38 / 486
» Using Aspects to Design a Secure System
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 11 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
AOSD
2008
ACM
13 years 9 months ago
StrongAspectJ: flexible and safe pointcut/advice bindings
AspectJ was designed as a seamless aspect-oriented extension of the Java programming language. However, unlike Java, AspectJ does not have a safe type system: an accepted binding ...
Bruno De Fraine, Mario Südholt, Viviane Jonck...
HICSS
2009
IEEE
114views Biometrics» more  HICSS 2009»
13 years 11 months ago
Groupware for Design: An Interactive System to Facilitate Creative Processes in Team Design Work
Creativity as modeled using the recluse genius paradigm fails to recognize the necessity and value of the collaborative aspects involved. Enhancing the creative output of teams wi...
Arjun Venkataswamy, Rajinder Sodhi, Yerkin Abdildi...
PPNA
2011
13 years 2 months ago
Security and privacy issues in P2P streaming systems: A survey
Streaming applications over Peer-To-Peer (P2P) systems have gained an enormous popularity. Success always implies increased concerns about security, protection, privacy and all the...
Gabriela Gheorghe, Renato Lo Cigno, Alberto Montre...
AICT
2010
IEEE
240views Communications» more  AICT 2010»
12 years 11 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...