Sciweavers

OOPSLA
1997
Springer
14 years 3 months ago
Composite Design Patterns
ed Abstract Factory is yet another. When patterns cooperate, the cooperation itself can give rise to problems, contexts, trade-offs, and consequences. For instance, should a Visito...
Dirk Riehle
OOPSLA
1997
Springer
14 years 3 months ago
Query-Based Debugging of Object-Oriented Programs
Object relationships in modern software systems are becoming increasingly numerous and complex. Programmers who try to find violations of such relationships need new tools that al...
Raimondas Lencevicius, Urs Hölzle, Ambuj K. S...
OOPSLA
1997
Springer
14 years 3 months ago
Call Graph Construction in Object-Oriented Languages
David Grove, Greg DeFouw, Jeffrey Dean, Craig Cham...
OOPSLA
1997
Springer
14 years 3 months ago
Parasitic Methods: An Implementation of Multi-Methods for Java
In an object-oriented programming language, method selection is (usually) done at run-time using the class of the receiver. Some object-orientedlanguages(such as CLOS) have multi-...
John Boyland, Giuseppe Castagna
OOPSLA
1997
Springer
14 years 3 months ago
Adding Type Parameterization to the Java Language
Ole Agesen, Stephen N. Freund, John C. Mitchell
SP
1996
IEEE
118views Security Privacy» more  SP 1996»
14 years 3 months ago
A Fair Non-repudiation Protocol
: This paper examines the Zhou-Gollmann fair non-repudiation protocol as well as its modified version of Kim et al. We describe how these protocols are vulnerable to an attack by a...
Jianying Zhou, Dieter Gollmann
SP
1996
IEEE
106views Security Privacy» more  SP 1996»
14 years 3 months ago
Security Properties and CSP
Security properties such as con dentiality and authenticity may be considered in terms of the ow of messages within a network. To the extent that this characterisation is justi ed...
Steve Schneider
SP
1996
IEEE
14 years 3 months ago
View-Based Access Control with High Assurance
View-based access control enables content-based and context-based security, as opposed to container-based security provided in operating systems. However, view-based access contro...
Xiaolei Qian
SP
1996
IEEE
136views Security Privacy» more  SP 1996»
14 years 3 months ago
On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions
Recently, two major bankcard payment instrument operators VISA and MasterCard published speci cations for securing bankcard payment transactions on open networks for open scrutiny...
Wenbo Mao