메뉴 건너뛰기




Volumn , Issue , 2007, Pages 49-54

A security-by-contract architecture for pervasive services

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL POWERS; CONTRACT ARCHITECTURES; LAYERED SECURITIES; MITIGATION STRATEGIES; NOMADIC DEVICES; PERVASIVE ENVIRONMENTS; PERVASIVE SERVICES; SECURITY FEATURES; SECURITY SERVICES;

EID: 47649093926     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPERU.2007.2     Document Type: Conference Paper
Times cited : (13)

References (19)
  • 1
    • 47649086453 scopus 로고    scopus 로고
    • 3MS consortium, February 2007.
    • 3MS consortium, February 2007.
  • 2
    • 47649093141 scopus 로고    scopus 로고
    • 3MS consortium, February 2007.
    • 3MS consortium, February 2007.
  • 3
    • 33750110668 scopus 로고    scopus 로고
    • Toward Pervasive Computing
    • J. Bacon. Toward Pervasive Computing. IEEE Perv., 1(2):84-86, 2002.
    • (2002) IEEE Perv , vol.1 , Issue.2 , pp. 84-86
    • Bacon, J.1
  • 4
    • 33847675361 scopus 로고    scopus 로고
    • Businessfinder: Harnessing presence to enable live yellow pages for small, medium and micro mobile businesses
    • Jan
    • D. Chakraborty, K. Dasgupta, S. Mittal, A. Misra, A. Gupta, E. Newmark, and C. Oberle. Businessfinder: harnessing presence to enable live yellow pages for small, medium and micro mobile businesses. IEEE Comm., 45(1):144-151, Jan. 2007.
    • (2007) IEEE Comm , vol.45 , Issue.1 , pp. 144-151
    • Chakraborty, D.1    Dasgupta, K.2    Mittal, S.3    Misra, A.4    Gupta, A.5    Newmark, E.6    Oberle, C.7
  • 5
    • 0033154298 scopus 로고    scopus 로고
    • A distributed architecture for multiplayer interactive applications on the internet
    • C. Diot and L. Gautier. A distributed architecture for multiplayer interactive applications on the internet. IEEE Network, 13(4):6-15, 1999.
    • (1999) IEEE Network , vol.13 , Issue.4 , pp. 6-15
    • Diot, C.1    Gautier, L.2
  • 6
    • 47649110330 scopus 로고    scopus 로고
    • 3MS consortium, February 2007.
    • 3MS consortium, February 2007.
  • 7
    • 24944483574 scopus 로고    scopus 로고
    • The Inlined Reference Monitor Approach to Security Policy Enforcement
    • Technical report 2003-1916, Department of Computer Science, Cornell University
    • U. Erlingsson. The Inlined Reference Monitor Approach to Security Policy Enforcement. Technical report 2003-1916, Department of Computer Science, Cornell University, 2003.
    • (2003)
    • Erlingsson, U.1
  • 8
    • 0033724116 scopus 로고    scopus 로고
    • IRM Enforcement of Java Stack Inspection
    • Washington, DC, USA
    • U. Erlingsson and F. B. Schneider. IRM Enforcement of Java Stack Inspection. In Proc. of IEEE SS&P'00, Washington, DC, USA, 2000.
    • (2000) Proc. of IEEE SS&P'00
    • Erlingsson, U.1    Schneider, F.B.2
  • 12
    • 33745202945 scopus 로고    scopus 로고
    • Online gaming demands heavyweight data centers
    • July
    • D. Kushner. Online gaming demands heavyweight data centers. IEEE Spectrum, 42(7):34-39, July 2005.
    • (2005) IEEE Spectrum , vol.42 , Issue.7 , pp. 34-39
    • Kushner, D.1
  • 14
    • 0037051773 scopus 로고    scopus 로고
    • Bytecode verification on java smart cards
    • X. Leroy. Bytecode verification on java smart cards. Softw. Pract. Exper., 32(4):319-340, 2002.
    • (2002) Softw. Pract. Exper , vol.32 , Issue.4 , pp. 319-340
    • Leroy, X.1
  • 15
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • Feb
    • J. Ligatti, L. Bauer, and D. Walker. Edit automata: Enforcement mechanisms for run-time security policies. IJIS, 4(1-2):2-16, Feb. 2005.
    • (2005) IJIS , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 16
    • 20344386262 scopus 로고    scopus 로고
    • Peer-to-peer architecture and protocol for a massively multiplayer online game
    • Dallas, TX, 29 Nov.-3 Dec, IEEE
    • M. Merabti and A. E. Rhalibi. Peer-to-peer architecture and protocol for a massively multiplayer online game. In Proc. of GLOBECOM'04, pages 519-528, Dallas, TX, 2004, 29 Nov.-3 Dec. 2004. IEEE.
    • (2004) Proc. of GLOBECOM'04 , pp. 519-528
    • Merabti, M.1    Rhalibi, A.E.2
  • 17
    • 0001800257 scopus 로고    scopus 로고
    • Safe, untrusted agents using proof-carrying code
    • Springer-Verlag, London, UK
    • G. C. Necula and P. Lee. Safe, untrusted agents using proof-carrying code. In Mobile Agents and Security, pages 61-91. Springer-Verlag, London, UK, 1998.
    • (1998) Mobile Agents and Security , pp. 61-91
    • Necula, G.C.1    Lee, P.2
  • 18
    • 21644473233 scopus 로고    scopus 로고
    • NET Security: Lessons Learned and Missed from Java
    • N. Paul and D. Evans. .NET Security: Lessons Learned and Missed from Java. In Proc. of ACSAC'04, 2004.
    • (2004) Proc. of ACSAC'04
    • Paul, N.1    Evans, D.2
  • 19
    • 33745452062 scopus 로고    scopus 로고
    • The Psychology of MMORPGs: Emotional Investment, Motivations, Relationship Formation, and Problematic Usage
    • R. Schroeder and A. Axelsson, editors, London, Springer-Verlag
    • N. Yee. The Psychology of MMORPGs: Emotional Investment, Motivations, Relationship Formation, and Problematic Usage. In R. Schroeder and A. Axelsson, editors, Avatars at Work and Play: Collaboration and Interaction in Shared Virtual Environments, London, 2005. Springer-Verlag.
    • (2005) Avatars at Work and Play: Collaboration and Interaction in Shared Virtual Environments
    • Yee, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.