Java security: hostile applets, holes&antidotes
Java security: hostile applets, holes&antidotes
Securing Java: getting down to business with mobile code
Securing Java: getting down to business with mobile code
A component and communication model for push systems
ESEC/FSE-7 Proceedings of the 7th European software engineering conference held jointly with the 7th ACM SIGSOFT international symposium on Foundations of software engineering
Distributed systems (3rd ed.): concepts and design
Distributed systems (3rd ed.): concepts and design
IEEE Internet Computing
IEEE Internet Computing
IEEE Internet Computing
Supporting Multiple Access Control Policies in Database Systems
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
USITS'97 Proceedings of the USENIX Symposium on Internet Technologies and Systems on USENIX Symposium on Internet Technologies and Systems
Expanding and extending the security features of java
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Implementing multiple protection domains in java
ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference
Empowering mobile code using expressive security policies
Proceedings of the 2002 workshop on New security paradigms
Protecting Java component integrity against Trojan Horse programs
Integrity and internal control in information systems V
Type based adaptation: an adaptation approach for dynamic distributed systems
SEM'02 Proceedings of the 3rd international conference on Software engineering and middleware
A generic XACML based declarative authorization scheme for java
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Towards remote policy enforcement for runtime protection of mobile code using trusted computing
IWSEC'06 Proceedings of the 1st international conference on Security
Hi-index | 0.00 |