Sciweavers

OOPSLA
2001
Springer
14 years 4 months ago
Multitasking without Compromise: A Virtual Machine Evolution
The Multitasking Virtual Machine (called from now on simply MVM) is a modification of the Java™ virtual machine. It enables safe, secure, and scalable multitasking. Safety is ac...
Grzegorz Czajkowski, Laurent Daynès
OOPSLA
2001
Springer
14 years 4 months ago
The Java Syntactic Extender
The ability to extend a language with new syntactic forms is a powerful tool. A sufficiently flexible macro system allows programmers to build from a common base towards a langua...
Jonathan Bachrach, Keith Playford
OOPSLA
2001
Springer
14 years 4 months ago
Portable Resource Control in Java: The J-SEAL2 Approach
Preventing abusive resource consumption is indispensable for all kinds of systems that execute untrusted mobile code, such as mobile object systems, extensible web servers, and we...
Walter Binder, Jarle Hulaas, Alex Villazón
ESMART
2001
Springer
14 years 4 months ago
Use of Biometrics for User Verification in Electronic Signature Smartcards
If a smartcard provides security functions such as electronic signature creation, valuables such as electronic money and/or sensitive data such as medical data, then the smartcard ...
Bruno Struif
ESMART
2001
Springer
14 years 4 months ago
An Operational Semantics of the Java Card Firewall
This paper presents an operational semantics for a subset of Java Card bytecode, focussing on aspects of the Java Card firewall, method invocation, field access, variable access,...
Marc Éluard, Thomas P. Jensen, Ewen Denney
ESMART
2001
Springer
14 years 4 months ago
An Internet Authorization Scheme Using Smart-Card-Based Security Kernels
Yves Deswarte, Noreddine Abghour, Vincent Nicomett...
CCS
2001
ACM
14 years 4 months ago
Practical forward secure group signature schemes
A group signature scheme allows a group member to sign messages anonymously on behalf of the group, while in case of a dispute, a designated entity can reveal the identity of a si...
Dawn Xiaodong Song
CCS
2001
ACM
14 years 4 months ago
Interoperable strategies in automated trust negotiation
Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify ...
Ting Yu, Marianne Winslett, Kent E. Seamons
CCS
2001
ACM
14 years 4 months ago
OCB: a block-cipher mode of operation for efficient authenticated encryption
Phillip Rogaway, Mihir Bellare, John Black, Ted Kr...
CCS
2001
ACM
14 years 4 months ago
Tangler: a censorship-resistant publishing system based on document entanglements
We describe the design of a censorship-resistant system that employs a unique document storage mechanism. Newly published documents are dependent on the blocks of previously publi...
Marc Waldman, David Mazières