Sciweavers

2838 search results - page 52 / 568
» Verifying Controlled Components
Sort
View
POPL
2008
ACM
14 years 9 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
AAMAS
2006
Springer
13 years 9 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
ICWE
2003
Springer
14 years 2 months ago
Partitioning the Navigational Model: A Component-Driven Approach
Abstract. This paper proposes using a Component Approach to model navigation in a hypertext application. It proposes Navigational Semantic Units (NSUs), which are component-oriente...
Stephen Kerr, Daniel M. Germán
OOIS
1997
Springer
14 years 1 months ago
A Framework for Component-Oriented Tool Integration
Tool environments supporting the development of complex products need to be open and flexible. These requirements cannot be fulfilled in an adequate way by predefined coordinat...
Kai-Uwe Sattler
MICRO
2006
IEEE
191views Hardware» more  MICRO 2006»
13 years 8 months ago
CAPSULE: Hardware-Assisted Parallel Execution of Component-Based Programs
Since processor performance scalability will now mostly be achieved through thread-level parallelism, there is a strong incentive to parallelize a broad range of applications, inc...
Pierre Palatin, Yves Lhuillier, Olivier Temam