نتایج جستجو برای: api x70
تعداد نتایج: 14790 فیلتر نتایج به سال:
1. Purpose ............................................ 1 2. Introduction ....................................... 1 3. GSS-API Security Context Establishment ............. 2 4. GSS-API Protection-level Options ................... 5 5. GSS-API Per-message Protection ..................... 7 6. GSS-API Security Context Termination ............... 8 7. References ......................................
Empirical evidence indicates that developers face significant hurdles when the API elements necessary to implement a task are not accessible from the types they are working with. We propose an approach that leverages the structural relationships between API elements to make API methods or types not accessible from a given API type more discoverable. We implemented our approach as an extension t...
The Generic Security Services API (GSS-API) provides a naming architecture that supports name-based authorization. GSS-API authenticates two named parties to each other. Names can be stored on access control lists (ACLs) to make authorization decisions. Advances in security mechanisms and the way implementers wish to use GSS-API require this model to be extended for the next version of GSS-API....
Web APIs provide a systematic and extensible approach for application-toapplication interaction. Developers using web APIs are forced to accompany the API providers in their software evolution tasks. In order to understand the distress caused by this imposition on web API client developers we perform a semi-structured interview with six such developers. We also investigate how major web API pro...
Acute Peripheral Ischemia (API) is the most severe acute complication after both open and closed fractures, as ischemia compromises not only the vitality of the affected limb, but also the patient's life, because metabolic anaerobic changes following ischemia have serious local and general consequences. These explain why early diagnosis of API is very important for the prognosis of the traumati...
The Extensible Markup Language (XML) consists of two Application Programming Interface (API) i.e. Document Object Model (DOM) and Simple Application of XML (SAX). Previous research has used the DOM API in the Leave Application prototype. In this research, the DOM API based code that developed in the prototype will be changed to SAX API based code. The performance measurement then is carried out...
A system is vulnerable to an API-level attack if its security can be compromised by invoking an allowed sequence of operations from its API. We present a formal framework to model and analyze APIs, and develop an automatic technique based upon bounded model checking to discover API-level vulnerabilities. If a vulnerability exists, our technique produces a trace of API operations demonstrating a...
Malware stands for malicious software. It is software that is designed with a harmful intent. A malware detector is a system that attempts to identify malware using Application Programming Interface (API) call graph technique and/or other techniques. API call graph techniques follow two main steps, namely, transformation of malware samples into an API call graph using API call graph constructio...
An application programming interface (API) is a specification intended to be used as an interface by software components to communicate with each other. An API may include specifications for routines, data structures, object classes, and variables. An API specification can take many forms, including an International Standard such as POSIX or vendor documentation such as the Microsoft Windows AP...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید