-
1
-
-
84949500337
-
A flexible access control service for Java mobile code
-
New Orleans, Louisiana, USA, IEEE
-
C. A., R. Montanari, E. Lupu, M. Sloman, and C. Stefanelli. A flexible access control service for Java mobile code. In Annual Computer Security Applications Conference, pages 356-365, New Orleans, Louisiana, USA, 2000. IEEE.
-
(2000)
Annual Computer Security Applications Conference
, pp. 356-365
-
-
Montanari, C.A.R.1
Lupu, E.2
Sloman, M.3
Stefanelli, C.4
-
2
-
-
84944048132
-
The ponder policy specification language
-
London, UK, Springer-Verlag
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The ponder policy specification language. In POLICY '01: Proceedings of the International Workshop on Policies for Distributed Systems and Networks, pages 18-38, London, UK, 2001. Springer-Verlag.
-
(2001)
POLICY '01: Proceedings of the International Workshop on Policies for Distributed Systems and Networks
, pp. 18-38
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
3
-
-
0032667877
-
Flexible policy-directed code safety
-
Oakland, CA, May IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press
-
D. Evans and A. Twyman. Flexible policy-directed code safety. In IEEE Symposium on Research in Security and Privacy, pages 32-45, Oakland, CA, May 1999. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press.
-
(1999)
IEEE Symposium on Research in Security and Privacy
, pp. 32-45
-
-
Evans, D.1
Twyman, A.2
-
4
-
-
84887507059
-
Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2
-
Monterey, California, December USENIX, Berkeley, CA
-
L. Gong, M. Mueller, H. Prafullchandra, and S. R. Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2. In USENIX Symposium on Internet Technologies and Systems, pages 103-112, Monterey, California, December 1997. USENIX, Berkeley, CA.
-
(1997)
USENIX Symposium on Internet Technologies and Systems
, pp. 103-112
-
-
Gong, L.1
Mueller, M.2
Prafullchandra, H.3
R., S.4
-
6
-
-
82955230066
-
An overview of AspectJ
-
Budapest, Hungary, Springer
-
G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W. G. Griswold. An Overview of AspectJ. In ECOOP 2001, volume LNCS 2072, pages 327-353, Budapest, Hungary, 2001. Springer.
-
(2001)
ECOOP 2001
, vol.LNCS 2072
, pp. 327-353
-
-
Kiczales, G.1
Hilsdale, E.2
Hugunin, J.3
Kersten, M.4
Palm, J.5
Griswold, W.G.6
-
9
-
-
0041409715
-
Re-engineering security as a crosscutting concern - Experience with a third party application
-
September
-
I. Welch and R. Stroud. Re-engineering security as a crosscutting concern - experience with a third party application. The Computer Journal, 46(5):578-589, September 2003.
-
(2003)
The Computer Journal
, vol.46
, Issue.5
, pp. 578-589
-
-
Welch, I.1
Stroud, R.2
-
10
-
-
85094138664
-
Kava - Using byte-code rewriting to add behavioral reflection to Java
-
San Antonio, Texas, 29 January - 2 February USENIX, Berkeley, CA
-
I. Welch and R. J. Stroud. Kava - using byte-code rewriting to add behavioral reflection to Java. In Proceedings of COOTS 2001, USENIX Conference on Object-Oriented Technologies and Systems, pages 119-130, San Antonio, Texas, 29 January - 2 February 2001. USENIX, Berkeley, CA.
-
(2001)
Proceedings of COOTS 2001, USENIX Conference on Object-oriented Technologies and Systems
, pp. 119-130
-
-
Welch, I.1
Stroud, R.J.2
-
11
-
-
0036426315
-
Using reflection as a mechanism for enforcing security policies on compiled code
-
I. Welch and R. J. Stroud. Using reflection as a mechanism for enforcing security policies on compiled code. Journal of Computer Security, 10:399-432, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, pp. 399-432
-
-
Welch, I.1
Stroud, R.J.2
|