Bytecode verification on Java smart cards
This article presents a novel approach to the problem of bytecode verification for Java Card applets. By relying on prior off-card bytecode transformations, we simplify the bytecode verifier and reduce its memory requirements to the point where it can ...
Taming access control security: extending capabilities using the views relationship
The 'views' relationship indicates how an object-oriented design can be clearly separated into objects and their corresponding interface. This paper uses the concept of 'views' in order to achieve full separation between the application and the security ...
Java 3D, 3D graphical environments and behaviour
A brief outline of the structure of the Java 3D API as a means of producing graphical environments is provided. We then go on to examine issues in the development of a behaviour rich scene, in particular the issues of scene animation and collisions ...
MEADOW: a middleware for efficient databases through openGIS wrappers
With the proliferation of various geographic databases on the Internet, we have seen increasing needs for accessing them concurrently and remotely via the Web for high-level decision making. In this paper, we present Middleware for Efficient Access to ...