Safe language technology can be used for protection within a single address space. This protection is enforced by the language’s type system, which ensures that references to obj...
Thorsten von Eicken, Chi-Chao Chang, Grzegorz Czaj...
In this paper, we describe a method for the composition of components that are relatively correct under a particular criterion. The notion of composition pattern is also introduce...
Our industrial partners have difficulties coping with maintenance and reuse of their software applications, due to the hard coded presence of domain knowledge in the implementation...
Abstract. In Aspect-Oriented Programming we decompose a problem into a number of functional components as well as a number of aspects and then we compose these components and aspec...
ions for Mobile Computation Luca Cardelli Microsoft Research Abstract. We discuss the difficulties caused by mobile computing and mobile computation over wide area networks. We pro...
As the properties of components have gradually become clearer, attention has started to turn to the architectural issues which govern their interaction and composition. In this pa...
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...