Sciweavers

433 search results - page 10 / 87
» Web-Enabling Legacy Applications
Sort
View
ICST
2008
IEEE
14 years 4 months ago
Test-Driven Assessment of Access Control in Legacy Applications
If access control policy decision points are not neatly separated from the business logic of a system, the evolution of a security policy likely leads to the necessity of changing...
Yves Le Traon, Tejeddine Mouelhi, Alexander Pretsc...
IPPS
2003
IEEE
14 years 3 months ago
Wrapping Legacy Codes for Grid-Based Applications
This paper describes a process for the semi-automatic conversion of numerical and scientific routines written in the C programming language into Triana-based computational servic...
Yan Huang, Ian Taylor, David W. Walker, Robert Dav...
MOBILITY
2009
ACM
14 years 4 months ago
Mobile visual access to legacy voice-based applications
Vocal systems are a well-established reality. Examples of popular voice-based applications include helpdesk services, reservation systems, and vocal mailboxes. These services, tha...
Marco Avvenuti, Alessio Vecchio
LISA
2007
14 years 4 days ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
DANCE
2002
IEEE
14 years 2 months ago
Panda: Middleware to Provide the Benefits of Active Networks to Legacy Applications
Panda is middleware designed to bring the benefits of active networks to applications not written with active networks in mind. This paper describes the architecture and implement...
Vincent Ferreria, Alexey Rudenko, Kevin Eustice, R...