Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Myers, Andrew C. Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 4 of 4 reviews    
  Building secure Web applications with automatic partitioning
Chong S., Liu J., Myers A., Qi X., Vikram K., Zheng L., Zheng X. Communications of the ACM 52(2): 79-87, 2009.  Type: Article

Swift, a tool for building secure applications by constructions, and its methodology are the main topics of this article. Chong et al. perfectly state their reasoning: “Because Web applications are being used for so many impo...
...
Jun 4 2010  
  J&: nested intersection for scalable software composition
Nystrom N., Qi X., Myers A. ACM SIGPLAN Notices 41(10): 21-36, 2006.  Type: Article

How can Java packages be modified to better support large-scale software development? The authors offer nested inheritance and nested intersection as suitable modifications. An earlier paper covered nested inheritance [1]; this paper c...
...
Feb 9 2007  
  Protecting privacy using the decentralized label model
Myers A., Liskov B. ACM Transactions on Software Engineering and Methodology 9(4): 410-442, 2000.  Type: Article

The decentralized label model is a policy for labeling data in a computer system to preserve confidentiality and integrity. Its philosophical roots are in the Denning lattice model, in which static analysis of programming language stat...
...
Apr 1 2001  
  References to remote mobile objects in Thor
Day M., Liskov B., Maheshwari U., Myers A. ACM Letters on Programming Languages and Systems 2(1-4): 115-126, 1993.  Type: Article

Name server and remote link strategies for name resolution in the distributed object database Thor are evaluated. When a name service is used to resolve names, communication overhead may be accrued when the object is accessed. On the o...
...
Dec 1 1994  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy