메뉴 건너뛰기




Volumn 4, Issue , 2004, Pages 2158-2163

A security framework for executables in a ubiquitous computing environment

Author keywords

Certification; Component Composition; Direct Code Analysis; Network Security; Pervasive Computing; Proof Carrying Code; Sandbox; Security; Ubiquitous Computing

Indexed keywords

BINARY CODES; COMPUTER CRIME; FORMAL LOGIC; INTERNET; QUALITY OF SERVICE; TREES (MATHEMATICS); XML;

EID: 18144386158     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (6)

References (25)
  • 1
    • 0001853125 scopus 로고
    • The computer for the 21st century
    • Sept
    • M. Weiser, "The computer for the 21st century," Scientific American Int. Edition, vol. 265(3), pp. 66-73, Sept 1991.
    • (1991) Scientific American Int. Edition , vol.265 , Issue.3 , pp. 66-73
    • Weiser, M.1
  • 2
    • 0041876237 scopus 로고    scopus 로고
    • Software infrastructure and design challenges for ubiquitous computing applications
    • Dec
    • G. Banavar and A, Bernstein, "Software infrastructure and design challenges for ubiquitous computing applications," Comm. of the ACM, vol. 45(12), pp. 92-6, Dec 2002.
    • (2002) Comm. of the ACM , vol.45 , Issue.12 , pp. 92-96
    • Banavar, G.1    Bernstein, A.2
  • 3
    • 0037341461 scopus 로고    scopus 로고
    • Pervasive computing: A paradigm for the 21st century
    • March
    • D. Saha and A. Mukherjee, "Pervasive computing: a paradigm for the 21st century," Computer, vol. 36(3), pp. 25-31, March 2003.
    • (2003) Computer , vol.36 , Issue.3 , pp. 25-31
    • Saha, D.1    Mukherjee, A.2
  • 8
    • 0031378491 scopus 로고    scopus 로고
    • Security issues in networks with internet access
    • Dec.
    • C. E. Landwehr and D. M. Goldschlag, "Security Issues in Networks with Internet Access," Proc. of the IEEE, vol. 85(12), pp. 2034-51, Dec. 1997.
    • (1997) Proc. of the IEEE , vol.85 , Issue.12 , pp. 2034-2051
    • Landwehr, C.E.1    Goldschlag, D.M.2
  • 11
    • 18144395216 scopus 로고    scopus 로고
    • Java security and how to play outside the Java sandbox
    • Nov.
    • T. A. Scott, "Java security and how to play outside the Java sandbox," Journal of Computing in Small Colleges, vol. 15(1), pp. 114-25, Nov. 1999.
    • (1999) Journal of Computing in Small Colleges , vol.15 , Issue.1 , pp. 114-125
    • Scott, T.A.1
  • 12
    • 18144422575 scopus 로고    scopus 로고
    • Throwing sand in the eyes of security [Java]
    • 18 Feb.-3 March
    • B. Walder, "Throwing sand in the eyes of security [Java]," InformationWeek, vol. 23, pp. 37-8, 41, 18 Feb.-3 March 1998.
    • (1998) InformationWeek , vol.23 , pp. 37-38
    • Walder, B.1
  • 14
    • 85084097858 scopus 로고    scopus 로고
    • Safe kernel extensions without run-time checking
    • Oct.
    • G. C. Necula and P. Lee, "Safe kernel extensions without run-time checking," Operating Systems Review, vol. 30, pp. 229-43, 28-31 Oct. 1996.
    • (1996) Operating Systems Review , vol.30 , pp. 229-243
    • Necula, G.C.1    Lee, P.2
  • 17
    • 84958983468 scopus 로고    scopus 로고
    • A scalable architecture for proof-carrying code
    • Functional and Logic Programming. 5th International Symposium, FLOPS 2001
    • G. C. Necula, "A scalable architecture for Proof-Carrying Code," in Functional and Logic Programming. 5th International Symposium, FLOPS 2001. Proc. Lecture Notes in Computer Science vol. 2024, 2001.
    • (2001) Proc. Lecture Notes in Computer Science , vol.2024
    • Necula, G.C.1
  • 19
    • 0032202421 scopus 로고    scopus 로고
    • An effective model for composition of secure system
    • Nov.
    • Q. Shi and N. Zhang, "An effective model for composition of secure system," Journal of Systems and Software, vol. 43(3), pp. 233-44, Nov. 1998.
    • (1998) Journal of Systems and Software , vol.43 , Issue.3 , pp. 233-244
    • Shi, Q.1    Zhang, N.2
  • 20
    • 0002426876 scopus 로고    scopus 로고
    • A general theory of composition for a class of "possibilistic" properties
    • Jan
    • J. McLean, "A general theory of composition for a class of "possibilistic" properties," IEEE Transactions on Software Engineering, vol. 22(1), pp. 53-67, Jan 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 53-67
    • McLean, J.1
  • 25
    • 3042595025 scopus 로고    scopus 로고
    • An extensible framework for practical secure component composition in a ubiquitous computing environment
    • Las Vegas, USA, April
    • D. Llewellyn-Jones, M. Merabti, Q. Shi, and B. Askwith, "An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment," in Int. Conference on Information Technology, Las Vegas, USA, April 2004.
    • (2004) Int. Conference on Information Technology
    • Llewellyn-Jones, D.1    Merabti, M.2    Shi, Q.3    Askwith, B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.