-
1
-
-
0001853125
-
The computer for the 21st century
-
Sept
-
M. Weiser, "The computer for the 21st century," Scientific American Int. Edition, vol. 265(3), pp. 66-73, Sept 1991.
-
(1991)
Scientific American Int. Edition
, vol.265
, Issue.3
, pp. 66-73
-
-
Weiser, M.1
-
2
-
-
0041876237
-
Software infrastructure and design challenges for ubiquitous computing applications
-
Dec
-
G. Banavar and A, Bernstein, "Software infrastructure and design challenges for ubiquitous computing applications," Comm. of the ACM, vol. 45(12), pp. 92-6, Dec 2002.
-
(2002)
Comm. of the ACM
, vol.45
, Issue.12
, pp. 92-96
-
-
Banavar, G.1
Bernstein, A.2
-
3
-
-
0037341461
-
Pervasive computing: A paradigm for the 21st century
-
March
-
D. Saha and A. Mukherjee, "Pervasive computing: a paradigm for the 21st century," Computer, vol. 36(3), pp. 25-31, March 2003.
-
(2003)
Computer
, vol.36
, Issue.3
, pp. 25-31
-
-
Saha, D.1
Mukherjee, A.2
-
4
-
-
0001982732
-
A survey of active network research
-
Jan.
-
D. L. Tennenhouse, J. M. Smith, W. D. Sincoskie, D. J. Wetherall, and G. J. Minden, "A survey of active network research," IEEE Communications Magazine, vol. 35(1), pp. 80-6, Jan. 1997.
-
(1997)
IEEE Communications Magazine
, vol.35
, Issue.1
, pp. 80-86
-
-
Tennenhouse, D.L.1
Smith, J.M.2
Sincoskie, W.D.3
Wetherall, D.J.4
Minden, G.J.5
-
5
-
-
0037376432
-
A secure infrastructure for service discovery and access in pervasive computing
-
J. Undercoffer, F. Perich, A. Cedilnik, L. Kagal, and A. Joshi, "A secure infrastructure for service discovery and access in pervasive computing," Mobile Networks and Applications, vol. 8(2), pp. 113-25, 2003.
-
(2003)
Mobile Networks and Applications
, vol.8
, Issue.2
, pp. 113-125
-
-
Undercoffer, J.1
Perich, F.2
Cedilnik, A.3
Kagal, L.4
Joshi, A.5
-
6
-
-
0035281459
-
The Ninja architecture for robust Internet-scale systems and services
-
March
-
S. D. Gribble, M. Welsh, R. Von-Behren, E. A. Brewer, D. Culler, N. Borisov, S. Czerwinski, R. Gummadi, J. Hill, A. Joseph, R. H. Katz, Z. M. Mao, S. Ross, and B. Zhao, "The Ninja architecture for robust Internet-scale systems and services," Comp. Networks, vol. 35(4), pp. 473-97, March 2001.
-
(2001)
Comp. Networks
, vol.35
, Issue.4
, pp. 473-497
-
-
Gribble, S.D.1
Welsh, M.2
Von-Behren, R.3
Brewer, E.A.4
Culler, D.5
Borisov, N.6
Czerwinski, S.7
Gummadi, R.8
Hill, J.9
Joseph, A.10
Katz, R.H.11
Mao, Z.M.12
Ross, S.13
Zhao, B.14
-
8
-
-
0031378491
-
Security issues in networks with internet access
-
Dec.
-
C. E. Landwehr and D. M. Goldschlag, "Security Issues in Networks with Internet Access," Proc. of the IEEE, vol. 85(12), pp. 2034-51, Dec. 1997.
-
(1997)
Proc. of the IEEE
, vol.85
, Issue.12
, pp. 2034-2051
-
-
Landwehr, C.E.1
Goldschlag, D.M.2
-
10
-
-
3042591670
-
How computer security works
-
Oct.
-
W. Cheswick, S. M. Bellovin, W. Ford, and J. Gosling, "How computer security works," Scientific American Int. Edition, vol. 279(4), pp. 78-81, Oct. 1998.
-
(1998)
Scientific American Int. Edition
, vol.279
, Issue.4
, pp. 78-81
-
-
Cheswick, W.1
Bellovin, S.M.2
Ford, W.3
Gosling, J.4
-
11
-
-
18144395216
-
Java security and how to play outside the Java sandbox
-
Nov.
-
T. A. Scott, "Java security and how to play outside the Java sandbox," Journal of Computing in Small Colleges, vol. 15(1), pp. 114-25, Nov. 1999.
-
(1999)
Journal of Computing in Small Colleges
, vol.15
, Issue.1
, pp. 114-125
-
-
Scott, T.A.1
-
12
-
-
18144422575
-
Throwing sand in the eyes of security [Java]
-
18 Feb.-3 March
-
B. Walder, "Throwing sand in the eyes of security [Java]," InformationWeek, vol. 23, pp. 37-8, 41, 18 Feb.-3 March 1998.
-
(1998)
InformationWeek
, vol.23
, pp. 37-38
-
-
Walder, B.1
-
14
-
-
85084097858
-
Safe kernel extensions without run-time checking
-
Oct.
-
G. C. Necula and P. Lee, "Safe kernel extensions without run-time checking," Operating Systems Review, vol. 30, pp. 229-43, 28-31 Oct. 1996.
-
(1996)
Operating Systems Review
, vol.30
, pp. 229-243
-
-
Necula, G.C.1
Lee, P.2
-
15
-
-
0037413289
-
Automated techniques for provably safe mobile code
-
2 Jan
-
C. Colby, K. Crary, R. Harper, P. Lee, and F. Pfenning, "Automated techniques for provably safe mobile code," Theoretical Computer Science, vol. 290(2), pp. 1175-99, 2 Jan 2003.
-
(2003)
Theoretical Computer Science
, vol.290
, Issue.2
, pp. 1175-1199
-
-
Colby, C.1
Crary, K.2
Harper, R.3
Lee, P.4
Pfenning, F.5
-
17
-
-
84958983468
-
A scalable architecture for proof-carrying code
-
Functional and Logic Programming. 5th International Symposium, FLOPS 2001
-
G. C. Necula, "A scalable architecture for Proof-Carrying Code," in Functional and Logic Programming. 5th International Symposium, FLOPS 2001. Proc. Lecture Notes in Computer Science vol. 2024, 2001.
-
(2001)
Proc. Lecture Notes in Computer Science
, vol.2024
-
-
Necula, G.C.1
-
18
-
-
17144374942
-
A certifying compiler for Java
-
May
-
C. Colby, P. Lee, G. C. Nedula, F. Blau, M. Plesko, and K. Cline, "A certifying compiler for Java," SIGPLAN Notices, vol. 35(5), pp. 95-107, May 2000.
-
(2000)
SIGPLAN Notices
, vol.35
, Issue.5
, pp. 95-107
-
-
Colby, C.1
Lee, P.2
Nedula, G.C.3
Blau, F.4
Plesko, M.5
Cline, K.6
-
19
-
-
0032202421
-
An effective model for composition of secure system
-
Nov.
-
Q. Shi and N. Zhang, "An effective model for composition of secure system," Journal of Systems and Software, vol. 43(3), pp. 233-44, Nov. 1998.
-
(1998)
Journal of Systems and Software
, vol.43
, Issue.3
, pp. 233-244
-
-
Shi, Q.1
Zhang, N.2
-
20
-
-
0002426876
-
A general theory of composition for a class of "possibilistic" properties
-
Jan
-
J. McLean, "A general theory of composition for a class of "possibilistic" properties," IEEE Transactions on Software Engineering, vol. 22(1), pp. 53-67, Jan 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 53-67
-
-
McLean, J.1
-
24
-
-
84958174818
-
Secure component composition for networked appliances
-
Liverpool, United Kingdom, 30-31 October
-
B. Askwith, Q. Shi, and M. Merabti, "Secure Component Composition for Networked Appliances," in 5th IEEE International Workshop on Networked Appliances, Liverpool, United Kingdom, 30-31 October 2002.
-
(2002)
5th IEEE International Workshop on Networked Appliances
-
-
Askwith, B.1
Shi, Q.2
Merabti, M.3
-
25
-
-
3042595025
-
An extensible framework for practical secure component composition in a ubiquitous computing environment
-
Las Vegas, USA, April
-
D. Llewellyn-Jones, M. Merabti, Q. Shi, and B. Askwith, "An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment," in Int. Conference on Information Technology, Las Vegas, USA, April 2004.
-
(2004)
Int. Conference on Information Technology
-
-
Llewellyn-Jones, D.1
Merabti, M.2
Shi, Q.3
Askwith, B.4
|