Design and implementation of a distributed virtual machine for networked computers
Proceedings of the seventeenth ACM symposium on Operating systems principles
A secure execution framework for Java
Proceedings of the 7th ACM conference on Computer and communications security
Formalizing the safety of Java, the Java virtual machine, and Java card
ACM Computing Surveys (CSUR)
Termination in language-based systems
ACM Transactions on Information and System Security (TISSEC)
IEEE Internet Computing
DPS: An Architectural Style for Development of Secure Software
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Using reflection as a mechanism for enforcing security policies on compiled code
Journal of Computer Security - Special issue on ESORICS 2000
Mechanisms for secure modular programming in Java
Software—Practice & Experience - Special issue: Security software
Garbage Collector Memory Accounting in Language-Based Systems
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
When to Trust Mobile Objects: Access Control in the Jini(tm) Software System
TOOLS '99 Proceedings of the Technology of Object-Oriented Languages and Systems
Anomaly intrusion detection in dynamic execution environments
Proceedings of the 2002 workshop on New security paradigms
From the Ground Up: The DIMACS Software Security Workshop
IEEE Security and Privacy
Knowledge for Software Security
IEEE Security and Privacy
Towards agile security assurance
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Object Oriented Verification Kernels for Secure Java Applications
SEFM '05 Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods
Polaris: virus-safe computing for Windows XP
Communications of the ACM - Privacy and security in highly dynamic systems
A flexible model for dynamic linking in Java and C#
Theoretical Computer Science
Detecting malicious java code using virtual machine auditing
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Securing Java code: heuristics and an evaluation of static analysis tools
Proceedings of the 2008 workshop on Static analysis
An empirical security study of the native code in the JDK
SS'08 Proceedings of the 17th conference on Security symposium
Aspect-oriented support for synchronization in parallel computing
Proceedings of the 1st workshop on Linking aspect technology and evolution
Composing expressive runtime security policies
ACM Transactions on Software Engineering and Methodology (TOSEM)
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Flexible models for dynamic linking
ESOP'03 Proceedings of the 12th European conference on Programming
Proceedings of the Sixth Symposium on Usable Privacy and Security
Robusta: taming the native beast of the JVM
Proceedings of the 17th ACM conference on Computer and communications security
Software security aspects of Java-based mobile phones
Proceedings of the 2011 ACM Symposium on Applied Computing
The security cost of cheap user interaction
Proceedings of the 2011 workshop on New security paradigms workshop
Small webcomputing applied to distributed monte carlo calculations
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part III
Lightweight modeling of java virtual machine security constraints
ABZ'10 Proceedings of the Second international conference on Abstract State Machines, Alloy, B and Z
Object placement and caching strategies on AN.P2P
WAIM '06 Proceedings of the 7th international conference on Advances in Web-Age Information Management
Security model oriented attestation on dynamically reconfigurable component-based systems
Journal of Network and Computer Applications
Towards remote policy enforcement for runtime protection of mobile code using trusted computing
IWSEC'06 Proceedings of the 1st international conference on Security
Modeling the Java Bytecode Verifier
Science of Computer Programming
Alice in warningland: a large-scale field study of browser security warning effectiveness
SEC'13 Proceedings of the 22nd USENIX conference on Security
Hi-index | 0.00 |