메뉴 건너뛰기




Volumn 1, Issue , 2004, Pages 112-117

An extensible framework for practical secure component composition in a ubiquitous computing environment

Author keywords

[No Author keywords available]

Indexed keywords

COMPONENT COMPOSITION; COMPUTING ENVIRONMENTS; EXECUTABLE CODES; SECURE COMPONENTS;

EID: 3042595025     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITCC.2004.1286435     Document Type: Conference Paper
Times cited : (7)

References (18)
  • 4
    • 0041876237 scopus 로고    scopus 로고
    • Software infrastructure and design challenges for ubiquitous computing applications
    • G. Banavar and A. Bernstein, "Software infrastructure and design challenges for ubiquitous computing applications," Communications of the ACM, vol. 45(12), pp. 92-6, 2002.
    • (2002) Communications of the ACM , vol.45 , Issue.12 , pp. 92-96
    • Banavar, G.1    Bernstein, A.2
  • 6
    • 3042587545 scopus 로고    scopus 로고
    • A symbiotic relationship between formal methods and security
    • 7-9 July 1998 & 11-13 November 1998, York, UK & Williamsburg, VA, USA
    • J. M. Wing, "A symbiotic relationship between formal methods and security," in Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions, 7-9 July 1998 & 11-13 November 1998, York, UK & Williamsburg, VA, USA, 1999.
    • (1999) Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions
    • Wing, J.M.1
  • 8
    • 84862385023 scopus 로고    scopus 로고
    • Composability of secrecy
    • Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security, 21-23 May 2001, St. Petersburg, Russia
    • J. Jürjens, "Composability of secrecy," in Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security. International Workshop MMM-ACNS 2001, 21-23 May 2001, St. Petersburg, Russia, 2001.
    • (2001) International Workshop MMM-ACNS 2001
    • Jürjens, J.1
  • 9
    • 0002426876 scopus 로고    scopus 로고
    • A general theory of composition for a class of "possibilistic" properties
    • J. McLean, "A general theory of composition for a class of "possibilistic" properties," IEEE Transactions on Software Engineering, vol. 22(1), pp. 53-67, 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 53-67
    • McLean, J.1
  • 12
    • 0032203850 scopus 로고    scopus 로고
    • Secure Java, class loading
    • L. Gong, "Secure Java, class loading," IEEE Internet Computing, vol. 2(6), pp. 56-61, 1998.
    • (1998) IEEE Internet Computing , vol.2 , Issue.6 , pp. 56-61
    • Gong, L.1
  • 13
    • 85084097858 scopus 로고    scopus 로고
    • Safe kernel extensions without run-time checking
    • G. C. Necula and P. Lee, "Safe kernel extensions without run-time checking," Operating Systems Review, vol. 30, pp. 229-43, 1996.
    • (1996) Operating Systems Review , vol.30 , pp. 229-243
    • Necula, G.C.1    Lee, P.2
  • 15
    • 0032202421 scopus 로고    scopus 로고
    • An effective model for composition of secure systems
    • Q. Shi and N. Zhang, "An effective model for composition of secure systems," Journal-of-Systems-and-Software, vol. 43(3), pp. 233-44, 1998.
    • (1998) Journal-of-systems-and-software , vol.43 , Issue.3 , pp. 233-244
    • Shi, Q.1    Zhang, N.2
  • 17
    • 84958983468 scopus 로고    scopus 로고
    • A scalable architecture for proof-carrying code
    • Functional and logic programming. 5th international symposium, FLOPS 2001. proceedings
    • G. C. Necula, "A scalable architecture for Proof-Carrying Code," in Functional and Logic Programming. 5th International Symposium, FLOPS 2001. Proceedings Lecture Notes in Computer Science vol. 2024, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2024
    • Necula, G.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.