I-JVM: a Java virtual machine for component isolation in OSGi

N Geoffray, G Thomas, G Muller… - 2009 IEEE/IFIP …, 2009 - ieeexplore.ieee.org
The OSGi framework is a Java-based, centralized, component oriented platform. It is being
widely adopted as an execution environment for the development of extensible applications …

On a classification approach for SOA vulnerabilities

L Lowis, R Accorsi - 2009 33rd Annual IEEE International …, 2009 - ieeexplore.ieee.org
Vulnerabilities in operating systems and Web applications have been and are being put into
various classifications, leading to a better understanding of their causes and effects, and to …

Vulnerability analysis in SOA-based business processes

L Lowis, R Accorsi - IEEE Transactions on Services Computing, 2010 - ieeexplore.ieee.org
Business processes and services can more flexibly be combined when based upon
standards. However, such flexible compositions practically always contain vulnerabilities …

Assessing attack surface with component-based package dependency

S Zhang, X Zhang, X Ou, L Chen, N Edwards… - Network and System …, 2015 - Springer
Package dependency has been considered in many vulnerability assessment systems.
However, existing approaches are either coarse-grained and do not accurately reveal the …

CHERI: A RISC capability machine for practical memory safety

JD Woodruff - 2014 - cl.cam.ac.uk
CHERI: A RISC capability machine for practical memory safety Page 1 Technical Report
Number 858 Computer Laboratory UCAM-CL-TR-858 ISSN 1476-2986 CHERI: A RISC …

Cooperative caching with adaptive prefetching in mobile ad hoc networks

MK Denko, J Tian - 2006 IEEE International Conference on …, 2006 - ieeexplore.ieee.org
In this paper, we propose a cooperative data caching and prefetching scheme for mobile ad
hoc networks (MANETs). In this scheme, multiple hosts cooperate in prefetching and …

Towards dynamic component isolation in a service oriented platform

K Gama, D Donsez - International Symposium on Component-Based …, 2009 - Springer
When dealing with dynamic component environments such as the OSGi Service Platform,
where components can come from different sources and may be known only during runtime …

A certified access control policy language: TEpla

A Eaman, A Felty - Innovations in Systems and Software Engineering, 2024 - Springer
Access control is an information security process which guards protected resources against
unauthorized access, as specified by restrictions in security policies. A variety of policy …

Ribbon networks for modeling navigable paths of autonomous agents in virtual urban environments

P Willemsen, JK Kearney… - IEEE Virtual Reality, 2003 …, 2003 - ieeexplore.ieee.org
The paper presents a real-time database for modeling complex networks of intersecting
roads and walkways in urban virtual environments. The database represents information …

Adaptive monitoring of end-user osgi-based home boxes

Y Maurel, A Bottaro, R Kopetz, K Attouchi - Proceedings of the 15th ACM …, 2012 - dl.acm.org
In-production performance monitoring is required for dynamic and modular systems open to
third-party applications such as the OSGi-based smart home box that home actors envision …