|
Volumn , Issue , 2007, Pages 233-242
|
Extending the Java Virtual Machine to enforce fine-grained security policies in mobile devices
|
Author keywords
[No Author keywords available]
|
Indexed keywords
ACCESS CONTROL;
COMPUTER APPLICATIONS;
COMPUTER PROGRAMMING LANGUAGES;
MOBILE DEVICES;
PORTABLE EQUIPMENT;
SECURITY SYSTEMS;
TELECOMMUNICATION EQUIPMENT;
ACCESS CONTROL DECISIONS;
APPLICATIONS.;
COMPUTER SECURITY APPLICATIONS;
CONTROL APPLICATIONS;
END USERS;
EXCELLENT PERFORMANCE;
HISTORY DATA;
JAVA VIRTUAL MACHINE;
MOBILE APPLICATIONS;
MOBILE SOFTWARES;
MOBILE SYSTEMS;
NEW GENERATION;
POLICY SPECIFICATION;
PROTOTYPE IMPLEMENTATIONS;
RUN-TIME;
SECURITY ARCHITECTURES;
SECURITY INFRASTRUCTURE;
SECURITY POLICIES;
SYSTEM SECURITY;
SYSTEM STATES;
VIRTUAL EXECUTION;
CONTROL SYSTEM APPLICATIONS;
|
EID: 48649101461
PISSN: 10639527
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ACSAC.2007.36 Document Type: Conference Paper |
Times cited : (26)
|
References (10)
|