메뉴 건너뛰기




Volumn 2, Issue , 2006, Pages 1580-1584

Policy-driven reflective enforcement of security policies

Author keywords

Reflection; Security policies

Indexed keywords

CODES (SYMBOLS); JAVA PROGRAMMING LANGUAGE; NETWORK PROTOCOLS; SOFTWARE PROTOTYPING;

EID: 33751029574     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1141277.1141645     Document Type: Conference Paper
Times cited : (2)

References (11)
  • 3
    • 0032667877 scopus 로고    scopus 로고
    • Flexible policy-directed code safety
    • Oakland, CA, May IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press
    • D. Evans and A. Twyman. Flexible policy-directed code safety. In IEEE Symposium on Research in Security and Privacy, pages 32-45, Oakland, CA, May 1999. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press.
    • (1999) IEEE Symposium on Research in Security and Privacy , pp. 32-45
    • Evans, D.1    Twyman, A.2
  • 4
    • 84887507059 scopus 로고    scopus 로고
    • Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2
    • Monterey, California, December USENIX, Berkeley, CA
    • L. Gong, M. Mueller, H. Prafullchandra, and S. R. Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2. In USENIX Symposium on Internet Technologies and Systems, pages 103-112, Monterey, California, December 1997. USENIX, Berkeley, CA.
    • (1997) USENIX Symposium on Internet Technologies and Systems , pp. 103-112
    • Gong, L.1    Mueller, M.2    Prafullchandra, H.3    R., S.4
  • 9
    • 0041409715 scopus 로고    scopus 로고
    • Re-engineering security as a crosscutting concern - Experience with a third party application
    • September
    • I. Welch and R. Stroud. Re-engineering security as a crosscutting concern - experience with a third party application. The Computer Journal, 46(5):578-589, September 2003.
    • (2003) The Computer Journal , vol.46 , Issue.5 , pp. 578-589
    • Welch, I.1    Stroud, R.2
  • 10
    • 85094138664 scopus 로고    scopus 로고
    • Kava - Using byte-code rewriting to add behavioral reflection to Java
    • San Antonio, Texas, 29 January - 2 February USENIX, Berkeley, CA
    • I. Welch and R. J. Stroud. Kava - using byte-code rewriting to add behavioral reflection to Java. In Proceedings of COOTS 2001, USENIX Conference on Object-Oriented Technologies and Systems, pages 119-130, San Antonio, Texas, 29 January - 2 February 2001. USENIX, Berkeley, CA.
    • (2001) Proceedings of COOTS 2001, USENIX Conference on Object-oriented Technologies and Systems , pp. 119-130
    • Welch, I.1    Stroud, R.J.2
  • 11
    • 0036426315 scopus 로고    scopus 로고
    • Using reflection as a mechanism for enforcing security policies on compiled code
    • I. Welch and R. J. Stroud. Using reflection as a mechanism for enforcing security policies on compiled code. Journal of Computer Security, 10:399-432, 2002.
    • (2002) Journal of Computer Security , vol.10 , pp. 399-432
    • Welch, I.1    Stroud, R.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.