Papers

Search results

    ConferenceTitleAuthor(s)
    COOTS '98IBDL: A Language for Interface Behavior Specification and TestingSreenivasa Viswanadha, Deepak Kapur
    COOTS '98Compile Time Symbolic Derivation with C++ TemplatesJoseph Gil, Zvi Gutterman
    COOTS '98Quality of Service Specification in Distributed Object Systems DesignSvend Frolund, Jari Koistinen
    COOTS '98Efficient Implementation of Java Remote Method Invocation (RMI)Vijaykumar Krishnaswamy, Dan Walther, Sumeer Bhola, Ethendranath Bommaiah, George Riley, Brad Topol, Mustaque Ahamad
    COOTS '98The Design and Performance of MedJavaPrashant Jain, Seth Widoff, Douglas C. Schmidt
    COOTS '98Dynamic Management of CORBA Trader FederationDjamel Belaid, Nicolas Provenzano, Chantal Taconet
    COOTS '98Filterfresh: Hot Replication of Java RMI Server ObjectsArash Baratloo, New York University, P. Emerald Chung, Yennun Huang, Sampath Rangarajan, Shalini Yajnik
    COOTS '98COMERA: COM Extensible Remoting ArchitectureYi-Min Wang, Woei-Jyh Lee
    COOTS '98Java Transactions for the InternetM.C. Little, S.K. Shrivastava
    COOTS '98Secure Delegation for Distributed Object EnvironmentsNataraj Nagaratnam, Doug Lea
    COOTS '98COBEA: A CORBA-Based Event ArchitectureChaoying Ma, Jean Bacon
    COOTS '98An Object-Oriented Framework for Distributed Computational Simulation of Aerospace Propulsion SystemsJohn A. Reed, Abdollah A. Afjeh
    COOTS '98Building a Scalable and Efficient Component Oriented System using CORBA - Active Badge System Case StudyJakub Szymaszek, Andrzej Uszok, Krzysztof Zielinski
    USENIX Security '98Towards Web Security Using PLASMAA. Krannig
    USENIX Security '98Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and RemediesVinod Anupam, Alain Mayer
    USENIX Security '98Certificate Revocation and Certificate UpdateMoni Naor, Kobbi Nissim
    USENIX Security '98Attack-Resistant Trust Metrics for Public Key CertificationRaph Levien, Alex Aiken
    USENIX Security '98Software Generation of Practically Strong Random NumbersPeter Gutmann
    USENIX Security '98A Comparison of Methods for Implementing Adaptive Security PoliciesMichael Carney, Brian Loe
    USENIX Security '98The CRISIS Wide Area Security ArchitectureEshwar Belani, Amin Vahdat, Thomas E. Anderson, Michael Dahlin
    USENIX Security '98Bro: A System for Detecting Network Intruders in Real-TimeVern Paxson
    USENIX Security '98Cryptographic Support for Secure Logs on Untrusted MachinesBruce Schneier, John Kelsey
    USENIX Security '98StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow AttacksCrispin Cowan, Calton Pu, Dave Maier, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang, Heather Hinton
    USENIX Security '98Data Mining Approaches for Intrusion DetectionWenke Lee, Salvatore J. Stolfo
    USENIX Security '98Securing Classical IP Over ATM NetworksCarsten Benecke, Uwe Ellermann

Pages