메뉴 건너뛰기




Volumn 46, Issue 5, 2003, Pages 578-589

Re-engineering security as a crosscutting concern

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); COMPUTER AIDED SOFTWARE ENGINEERING; COMPUTER ARCHITECTURE; COMPUTER SOFTWARE; JAVA PROGRAMMING LANGUAGE; SERVERS;

EID: 0041409715     PISSN: 00104620     EISSN: None     Source Type: Journal    
DOI: 10.1093/comjnl/46.5.578     Document Type: Article
Times cited : (4)

References (31)
  • 7
    • 0036426315 scopus 로고    scopus 로고
    • Using reflection as a mechanism for enforcing security policies on compiled code
    • Welch, I. and Stroud, R. J. (2002) Using reflection as a mechanism for enforcing security policies on compiled code. J. Comput. Security, 10, 399-432.
    • (2002) J. Comput. Security , vol.10 , pp. 399-432
    • Welch, I.1    Stroud, R.J.2
  • 9
    • 0029710976 scopus 로고    scopus 로고
    • Approach to object security in distributed SOM
    • Benantar, M., Blakley, B. and Nadain, A. J. (1996) Approach to object security in distributed SOM. IBM Syst. J., 35, 192-203.
    • (1996) IBM Syst. J. , vol.35 , pp. 192-203
    • Benantar, M.1    Blakley, B.2    Nadain, A.J.3
  • 23
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Lampson, B. W. (1973) A note on the confinement problem. Commun. ACM, 16, 613-615.
    • (1973) Commun. ACM , vol.16 , pp. 613-615
    • Lampson, B.W.1
  • 27
    • 85039649725 scopus 로고    scopus 로고
    • Technical Report APM.1931.01, Architecture Projects Management Limited (ANSA), Cambridge, UK
    • Wu, Z. and Schwiderski, S. (1997) Reflective Java, Technical Report APM.1931.01, Architecture Projects Management Limited (ANSA), Cambridge, UK. Available from http://www.ansa.co.uk.
    • (1997) Reflective Java
    • Wu, Z.1    Schwiderski, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.