Design and implementation of a distributed virtual machine for networked computers
Proceedings of the seventeenth ACM symposium on Operating systems principles
A formal specification of Java class loading
OOPSLA '00 Proceedings of the 15th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
An approach to safe object sharing
OOPSLA '00 Proceedings of the 15th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
POPL '01 Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
SAFKASI: a security mechanism for language-based systems
ACM Transactions on Software Engineering and Methodology (TOSEM)
Separating access control policy, enforcement, and functionality in extensible systems
ACM Transactions on Computer Systems (TOCS)
A scalable, robust network for parallel computing
Proceedings of the 2001 joint ACM-ISCOPE conference on Java Grande
Representation independence, confinement and access control [extended abstract]
POPL '02 Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Stack inspection: theory and variants
POPL '02 Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Multitasking without comprimise: a virtual machine evolution
OOPSLA '01 Proceedings of the 16th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Termination in language-based systems
ACM Transactions on Information and System Security (TISSEC)
Model-Carrying Code (MCC): a new paradigm for mobile-code security
Proceedings of the 2001 workshop on New security paradigms
A conservative algorithm for computing the flow of permissions in Java programs
ISSTA '02 Proceedings of the 2002 ACM SIGSOFT international symposium on Software testing and analysis
Validating firewalls using flow logics
Theoretical Computer Science
Incommunicado: efficient communication for isolates
OOPSLA '02 Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Access rights analysis for Java
OOPSLA '02 Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Ravenscar-Java: a high integrity profile for real-time Java
JGI '02 Proceedings of the 2002 joint ACM-ISCOPE conference on Java Grande
Bytecode verification on Java smart cards
Software—Practice & Experience
MySpiders: Evolve Your Own Intelligent Web Crawlers
Autonomous Agents and Multi-Agent Systems
A Software Architecture for Open Service Gateways
IEEE Internet Computing
Stack inspection: Theory and variants
ACM Transactions on Programming Languages and Systems (TOPLAS)
A formal model of the java multi-threading system and its validation on a known problem
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
IWAN '00 Proceedings of the Second International Working Conference on Active Networks
Reflections on MOPs, Components, and Java Security
ECOOP '01 Proceedings of the 15th European Conference on Object-Oriented Programming
On-Card Bytecode Verification for Java Card
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
A Simple Security-Aware MOP for Java
REFLECTION '01 Proceedings of the Third International Conference on Metalevel Architectures and Separation of Crosscutting Concerns
Policy-Driven Management of Agent Systems
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Mobile Agents Coordination in Mobadtl
COORDINATION '00 Proceedings of the 4th International Conference on Coordination Languages and Models
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference
Revised Papers from the 8th International Workshop on Security Protocols
Encapsulating Rules of Prudent Security Engineering
Revised Papers from the 9th International Workshop on Security Protocols
Java Bytecode Verification: An Overview
CAV '01 Proceedings of the 13th International Conference on Computer Aided Verification
DISSECT: DIStribution for SECurity Tool
ISC '01 Proceedings of the 4th International Conference on Information Security
Dynamic Binding in Mobile Applications: A Middleware Approach
IEEE Internet Computing
KLAVA: a Java package for distributed and mobile applications
Software—Practice & Experience
Abstract interpretation of mobile ambients
Science of Computer Programming - Special issue on static analysis (SAS'99)
IEEE Internet Computing
Access control: principles and solutions
Software—Practice & Experience - Special issue: Security software
Garbage Collector Memory Accounting in Language-Based Systems
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Assessment of the Java programming language for use in high integrity systems
ACM SIGPLAN Notices
Empowering mobile code using expressive security policies
Proceedings of the 2002 workshop on New security paradigms
Java Bytecode Verification: Algorithms and Formalizations
Journal of Automated Reasoning
Protecting Java component integrity against Trojan Horse programs
Integrity and internal control in information systems V
A static type system for JVM access control
ICFP '03 Proceedings of the eighth ACM SIGPLAN international conference on Functional programming
A security framework for reflective Java applications
Software—Practice & Experience
Using self-defending objects to develop security aware applications in Java™
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Security in an autonomic computing environment
IBM Systems Journal
Static analysis of role-based access control in J2EE applications
ACM SIGSOFT Software Engineering Notes
Context-Based Access Control for Ubiquitous Service Provisioning
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
A tail-recursive machine with stack inspection
ACM Transactions on Programming Languages and Systems (TOPLAS)
System support for pervasive applications
ACM Transactions on Computer Systems (TOCS)
Stack-based access control and secure information flow
Journal of Functional Programming
Ownership confinement ensures representation independence for object-oriented programs
Journal of the ACM (JACM)
Privileged operations in the PlanetLab virtualised environment
ACM SIGOPS Operating Systems Review
Journal of Functional Programming
Sub-operating systems: a new approach to application security
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
A microkernel virtual machine:: building security with clear interfaces
Proceedings of the 2006 workshop on Programming languages and analysis for security
Ad hoc extensibility and access control
ACM SIGOPS Operating Systems Review
Proceedings of the 21st annual ACM SIGPLAN conference on Object-oriented programming systems, languages, and applications
Software, regulation, and domain specificity
Information and Software Technology
CX: A scalable, robust network for parallel computing
Scientific Programming
Design and implementation of a secure wide-area object middleware
Computer Networks: The International Journal of Computer and Telecommunications Networking
System support for scalable, reliable and highly manageable web hosting service
USITS'01 Proceedings of the 3rd conference on USENIX Symposium on Internet Technologies and Systems - Volume 3
Enforcing resource bounds via static verification of dynamic checks
ACM Transactions on Programming Languages and Systems (TOPLAS) - Special Issue ESOP'05
Lightweight flexible isolation for language-based extensible systems
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Utilizing Binary Rewriting for Improving End-Host Security
IEEE Transactions on Parallel and Distributed Systems
A Virtual Machine Based Information Flow Control System for Policy Enforcement
Electronic Notes in Theoretical Computer Science (ENTCS)
Processor virtualization for secure mobile terminals
ACM Transactions on Design Automation of Electronic Systems (TODAES)
Utilizing national public-key infrastructure in mobile payment systems
Electronic Commerce Research and Applications
Securing Java code: heuristics and an evaluation of static analysis tools
Proceedings of the 2008 workshop on Static analysis
FIDES: An advanced chip multiprocessor platform for secure next generation mobile terminals
ACM Transactions on Embedded Computing Systems (TECS)
Model-Based Run-Time Checking of Security Permissions Using Guarded Objects
Runtime Verification
Security in Distributed Applications
Advances in Software Engineering
ACM Transactions on Computer-Human Interaction (TOCHI)
Security benchmarks of OSGi platforms: toward Hardened OSGi
Software—Practice & Experience
Jalapa: Securing Java with Local Policies
Electronic Notes in Theoretical Computer Science (ENTCS)
A resource management interface for the Java™ platform
A resource management interface for the Java™ platform
Web browser as an application platform: the lively Kernel experience
Web browser as an application platform: the lively Kernel experience
Mashware: the future of web applications
Mashware: the future of web applications
Data Privacy in Tuple Space Based Mobile Agent Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
Program Transformations under Dynamic Security Policies
Electronic Notes in Theoretical Computer Science (ENTCS)
Foundations for Designing Secure Architectures
Electronic Notes in Theoretical Computer Science (ENTCS)
Type based adaptation: an adaptation approach for dynamic distributed systems
SEM'02 Proceedings of the 3rd international conference on Software engineering and middleware
Retrofitting security into a web-based information system
ICWE'03 Proceedings of the 2003 international conference on Web engineering
A very small bytecode-verifier based on PCC algorithm for smart card
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
Types and Effects for resource usage analysis
FOSSACS'07 Proceedings of the 10th international conference on Foundations of software science and computational structures
An efficient small sized on-card verifier for java card
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
Enforcing Java run-time properties using bytecode rewriting
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Computer security from a programming language and static analysis perspective
ESOP'03 Proceedings of the 12th European conference on Programming
Enhancing Java security with history based access control
Foundations of security analysis and design IV
ISWC'06 Proceedings of the 5th international conference on The Semantic Web
History-based access control and secure information flow
CASSIS'04 Proceedings of the 2004 international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
Enforcing resource bounds via static verification of dynamic checks
ESOP'05 Proceedings of the 14th European conference on Programming Languages and Systems
Verifying a secure information flow analyzer
TPHOLs'05 Proceedings of the 18th international conference on Theorem Proving in Higher Order Logics
An efficient access control model for mobile ad-hoc communities
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Towards an evaluation methodology for computational trust systems
iTrust'05 Proceedings of the Third international conference on Trust Management
A framework for the modular specification and orchestration of authorization policies
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Rule-based policy representation and reasoning for the semantic web
RW'07 Proceedings of the Third international summer school conference on Reasoning Web
Hi-index | 0.00 |