Hidden Software Capabilities

نویسندگان

  • Daniel Hagimont
  • Jacques Mossière
  • Xavier Rousset de Pina
  • Frederic Saunier
چکیده

Software capabilities are a very convenient means to protect co-operating applications. They allow access rights to be dynamically exchanged between mutually suspicious interacting applications. However, in all the proposed approaches, capabilities are made available at the programming language level, requiring application developers to wire protection definition in the application code, which is detrimental to both flexibility and reusability. We believe instead that capabilities should be hidden from the application programmer, allowing protection definition and application code to be clearly

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Self-Diagnosis and Self-Planning with Constraint-based Hybrid Models

Many of today’s embedded systems – such as automobiles, automated factories or chemical plants – are an increasingly complex mixture of hardware components and embedded control software, showing both continuous (vehicle dynamics, silo fill levels) and discrete (software) behavior. As complexity grows, handling such systems, e.g. diagnosing and repairing faults, becomes harder. This problem is a...

متن کامل

Comparison of Information Retrieval Capabilities in Library Software of Payam, Voyager and Aleph

The purpose of this study was comparing Information Retrieval Capabilities in Web-based Library Software of Payam, with Voyager and ALEPH. A checklist designed and included six main trait for evaluation and comparing 73 scales. Data collected by experts' observing of the software's OPAC. Data analyzed by the descriptive statistics methods. Findings shows the preferences in search capabilities i...

متن کامل

Explanation of Qualitative Values in a Space with a view on the Capabilities of Vernacular Architecture (Case Study: Context-Based Architectural Schools)

The aim of the current has been based on explaining the introduction of hidden and apparent factors in the context and ground of architecture, which can be influenced by it in the process of audience’s educability from a new aspect; therefore, the “data-based theory”, which is one of the newest qualitative research methods, was applied and in order to demonstrate its efficiency, Yazd Faculty of...

متن کامل

Hidden partitioning of a visual feedback-based neuro-controller

Robotic controllers take advantage from neural network learning capabilities as long as the dimensionality of the problem is kept moderate. This paper explores the possibilities offered by the combination of several neural networks to design more complex modular controllers. This modularity is based on an internal partitioning of the problem. The partitioning must remain hidden, and should not ...

متن کامل

CORA 2016 Manual Matthias Althoff

The philosophy, architecture, and capabilities of the COntinuous Reachability Analyzer (CORA) are presented. CORA is a toolbox that integrates various vector and matrix set representations and operations on them as well as reachability algorithms of various dynamic system classes. The software is designed such that set representations can be exchanged without having to modify the code for reach...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996