Support for the file system security requirements of computational E-mail systems
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
The case for design using the World Wide Web
DAC '95 Proceedings of the 32nd annual ACM/IEEE Design Automation Conference
Rover: a toolkit for mobile information access
SOSP '95 Proceedings of the fifteenth ACM symposium on Operating systems principles
Implementing shared manufacturing services on the World-Wide Web
Communications of the ACM
Efficient and language-independent mobile programs
PLDI '96 Proceedings of the ACM SIGPLAN 1996 conference on Programming language design and implementation
A role-based access control model for protection domain derivation and management
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Requirements of role-based access control for collaborative systems
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
An active service framework and its application to real-time multimedia transcoding
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Flexible control of downloaded executable content
ACM Transactions on Information and System Security (TISSEC)
Integrated multimedia messaging concepts and applications
SAC '96 Proceedings of the 1996 ACM symposium on Applied Computing
A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments
Distributed and Parallel Databases - Security of data and transaction processing
A Light Workflow Management System Using SimpleProcess Models
Computer Supported Cooperative Work
Security properties of typed applets
Secure Internet programming
EW 7 Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications
Computer
Security Issues in Mobile Code Systems
Mobile Agents and Security
Mobile Agents and Security
Mobile Telescript Agents and the Web
COMPCON '96 Proceedings of the 41st IEEE International Computer Conference
Prerequisites for collaborative problem solving
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Towards a framework for collaborative software development of business application systems
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
A system architecture for flexible control of downloaded executable content
IWOOOS '96 Proceedings of the 5th International Workshop on Object Orientation in Operating Systems (IWOOOS '96)
Rethinking CSCW systems: the architecture of MILANO
ECSCW'97 Proceedings of the fifth conference on European Conference on Computer-Supported Cooperative Work
Dixie language and interpreter issues
VHLLS'94 Proceedings of the USENIX 1994 Very High Level Languages Symposium Proceedings on USENIX 1994 Very High Level Languages Symposium Proceedings
Managing complexity in TeamRooms, a Tcl-based internet groupware application
TCLTK'96 Proceedings of the 4th conference on USENIX Tcl/Tk Workshop, 1996 - Volume 4
Operating system protection for fine-grained programs
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Security of web browser scripting languages: vulnerabilities, attacks, and remedies
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Building systems that flexibly control downloaded executable context
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference
Towards an active network architecture
ACM SIGCOMM Computer Communication Review
Secure agent-mediated auctionlike negotiation protocol for internet retail commerce
CIA'99 Proceedings of the 3rd international conference on Cooperative information agents III
Intelligent agents: an emerging technology for next generation telecommunications?
INFOCOM'96 Proceedings of the Fifteenth annual joint conference of the IEEE computer and communications societies conference on The conference on computer communications - Volume 2
Java security: from hotjava to netscape and beyond
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Hi-index | 0.02 |