메뉴 건너뛰기




Volumn , Issue , 2002, Pages 61-68

Empowering mobile code using expressive security policies

Author keywords

Code transformation; Mobile code security; Security policies

Indexed keywords

CODES (SYMBOLS); ELECTRONIC MAIL; FINITE AUTOMATA; INTERNET; JAVA PROGRAMMING LANGUAGE; MULTI AGENT SYSTEMS;

EID: 0242612169     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/844111.844113     Document Type: Conference Paper
Times cited : (26)

References (16)
  • 1
    • 0242613070 scopus 로고    scopus 로고
    • BCEL API Documentation available at
    • BCEL API Documentation available at http://bcel.sourceforge.net/docs/index.html.
  • 10
    • 23544444332 scopus 로고    scopus 로고
    • Specifying security policies using a graphical approach
    • Technical report, University of California
    • J. Hoagland, R. Pandey, and K. Levitt. Specifying security policies using a graphical approach. Technical report, University of California, 1999.
    • (1999)
    • Hoagland, J.1    Pandey, R.2    Levitt, K.3
  • 12
    • 4243334152 scopus 로고    scopus 로고
    • Enforceable security polcies
    • Technical report, Cornell University
    • F. B. Schneider. Enforceable security polcies. Technical report, Cornell University, 1999.
    • (1999)
    • Schneider, F.B.1
  • 15
    • 4243334046 scopus 로고    scopus 로고
    • Pattern matching based intrusion detection systems
    • Tech report, Computer Science, StonyBrook
    • P. Uppuluri. Pattern matching based intrusion detection systems. Tech report, Computer Science, StonyBrook, 2001.
    • (2001)
    • Uppuluri, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.