메뉴 건너뛰기




Volumn , Issue , 1999, Pages 87-95

SASI enforcement of security policies: A retrospective

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER HARDWARE; COSTS; JAVA PROGRAMMING LANGUAGE; SOFTWARE PROTOTYPING; SECURITY OF DATA;

EID: 0033489650     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (223)

References (14)
  • 5
    • 84983009748 scopus 로고    scopus 로고
    • Providing policy-neutral and transparent access control in extensible systems
    • C.D. Jensen J. Vitek, editor, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Springer-Verlag
    • R. Grimm and B.N. Bershad. Providing policy-neutral and transparent access control in extensible systems. In C.D. Jensen J. Vitek, editor, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, volume 1603 of Lecture Notes in Computer Science, pages 317-338. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1603 , pp. 317-338
    • Grimm, R.1    Bershad, B.N.2
  • 7
    • 0004241913 scopus 로고    scopus 로고
    • Technical Report TR98 1661, Cornell University, January
    • D. Kozen. Efficient code certification. Technical Report TR98 1661, Cornell University, January 1998.
    • (1998) Efficient Code Certification
    • Kozen, D.1
  • 11
    • 0003970441 scopus 로고    scopus 로고
    • Technical Report TR98 1664, Cornell University, January
    • F.B. Schneider. Enforceable security policies. Technical Report TR98 1664, Cornell University, January 1998.
    • (1998) Enforceable Security Policies
    • Schneider, F.B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.