Sciweavers

SP
1989
IEEE
160views Security Privacy» more  SP 1989»
14 years 3 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash
SP
1989
IEEE
14 years 3 months ago
Security Issues in Policy Routing
Routing mechanisms for inter-autonomousregion communication require distribution of policy-sensitive information as well as algorithms that operate on such information. Without su...
Deborah Estrin, Gene Tsudik
SP
1989
IEEE
101views Security Privacy» more  SP 1989»
14 years 3 months ago
With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988
In early November 1988 the Internet, a collection of networks consisting of 60,000 host computers implementing the TCP/IP protocol suite, was attacked by a virus, a programwhich b...
Mark W. Eichin, Jon A. Rochlis
OOPSLA
1990
Springer
14 years 3 months ago
Type Substitution for Object-Oriented Programming
Genericity allows the substitution of types in a class. This is usually obtained through parameterized classes, although they are inflexible since any class can be inherited but i...
Jens Palsberg, Michael I. Schwartzbach
OOPSLA
1990
Springer
14 years 3 months ago
Viewing Objects as Patterns of Communicating Agents
Oscar Nierstrasz, Michael Papathomas
OOPSLA
1990
Springer
14 years 3 months ago
Strong Typing of Object-Oriented Languages Revisited
Ole Lehrmann Madsen, Boris Magnusson, Birger M&osl...
OOPSLA
1990
Springer
14 years 3 months ago
A Framework for Visualizing Object-Oriented Systems
This paper describes a new approach to visualizing program systems within the object-oriented paradigm. This approach is based on a TEX-like notation which has been extended and g...
Volker Haarslev, Ralf Möller
OOPSLA
1990
Springer
14 years 3 months ago
Exception Handling and Object-Oriented Programming: Towards a Synthesis
The paper presents a discussion and a specification of an exception handling system dedicated to object-oriented programming. We show how a full object-oriented representation of ...
Christophe Dony