-
1
-
-
51949083175
-
-
The AspectJ Project
-
The AspectJ Project. http://www.eclipse.org/aspectj/.
-
-
-
-
3
-
-
84883394662
-
-
OSGi
-
Knopflerfish - Open source OSGi.http://www.knopflerfish.org/.
-
Open source
-
-
-
6
-
-
51949109596
-
-
The Global System for Telematics (GST) project
-
The Global System for Telematics (GST) project. http://www.gstforum.org.
-
-
-
-
7
-
-
51949114584
-
Adding trace matching to AspectJ
-
Technical report, The abc Group
-
C. Allan et al. Adding trace matching to AspectJ. Technical report, The abc Group, 2005.
-
(2005)
-
-
Allan, C.1
-
8
-
-
51949098753
-
-
About the OSGi Service Platform, Paper.pdf, June, 2007
-
About the OSGi Service Platform, Technical Whitepaper. http://www.osgi.org/wiki/uploads/Links/OSGiTechnicalWhitePaper.pdf, June, 2007.
-
Technical Whitepaper
-
-
-
9
-
-
51949084592
-
-
J. P. Anderson. Computer Security technology planning study. Technical report, Deputy for Command and Management System, USA, 1972.
-
J. P. Anderson. Computer Security technology planning study. Technical report, Deputy for Command and Management System, USA, 1972.
-
-
-
-
12
-
-
51949101035
-
Architecting Secure Software Systems Using an Aspect-Oriented Approach: A Survey of Current Research
-
Technical report, Iowa State University
-
J. Dehlinger and N. V. Subramanian. Architecting Secure Software Systems Using an Aspect-Oriented Approach: A Survey of Current Research. Technical report, Iowa State University, 2006.
-
(2006)
-
-
Dehlinger, J.1
Subramanian, N.V.2
-
13
-
-
4544292230
-
Composition, reuse and interaction analysis of stateful aspects
-
USA, ACM
-
R. Douence, P. Fradet, and M. Südholt. Composition, reuse and interaction analysis of stateful aspects. In Proceedings of AOSD '04, pages 141-150, USA, 2004. ACM.
-
(2004)
Proceedings of AOSD '04
, pp. 141-150
-
-
Douence, R.1
Fradet, P.2
Südholt, M.3
-
14
-
-
0032218233
-
History-based Access Control for Mobile Code
-
New York, USA, ACM
-
G. Edjlali, A. Acharya, and V. Chaudhary. History-based Access Control for Mobile Code. In Proceedings of CCS '98, pages 38-48, New York, USA, 1998. ACM.
-
(1998)
Proceedings of CCS '98
, pp. 38-48
-
-
Edjlali, G.1
Acharya, A.2
Chaudhary, V.3
-
16
-
-
0012889295
-
A Language-based Approach to Security
-
Informatics 10 Years Back, 10 Years Ahead
-
F.B.Schneider, G.Morrisett, and R.Harper. A Language-based Approach to Security. In Informatics 10 Years Back, 10 Years Ahead, LNCS 2000, pages 86-101, 2000.
-
(2000)
LNCS
, vol.2000
, pp. 86-101
-
-
Schneider, F.B.1
Morrisett, G.2
Harper, R.3
-
17
-
-
35248881593
-
Advanced OSGi Security Layer
-
USA, IEEE Computer Society
-
C.-C. Huang, P.-C. Wang, and T.-W. Hou. Advanced OSGi Security Layer. In Proceedings of AINAW '07, pages 518-523, USA, 2007. IEEE Computer Society.
-
(2007)
Proceedings of AINAW '07
, pp. 518-523
-
-
Huang, C.-C.1
Wang, P.-C.2
Hou, T.-W.3
-
18
-
-
51949106653
-
Temporal Aspects as Security Automata
-
P. Hui and J. Riely. Temporal Aspects as Security Automata. In Proceedings of FOAL' 06), pages 19-28, 2006.
-
(2006)
Proceedings of FOAL' 06)
, pp. 19-28
-
-
Hui, P.1
Riely, J.2
-
20
-
-
35248828504
-
Aspect-Oriented Programming
-
G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. V. Lopes, J.-M. Loingtier, and J. Irwin. Aspect-Oriented Programming. In ECOOP, pages 220-242, 1997.
-
(1997)
ECOOP
, pp. 220-242
-
-
Kiczales, G.1
Lamping, J.2
Mendhekar, A.3
Maeda, C.4
Lopes, C.V.5
Loingtier, J.-M.6
Irwin, J.7
-
21
-
-
13444275220
-
Edit Automata: Enforcement Mechanisms for Run-time Security Policies
-
J. Ligatti, L. Bauer, and D. Walker. Edit Automata: Enforcement Mechanisms for Run-time Security Policies. International Journal of Information Security, 4(1-2):2-16, 2005.
-
(2005)
International Journal of Information Security
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
22
-
-
51949106069
-
-
Enforcement via Program Monitoring. PhD thesis, Princeton University
-
J. A. Ligatti. Policy Enforcement via Program Monitoring. PhD thesis, Princeton University, 2006.
-
(2006)
Policy
-
-
Ligatti, J.A.1
-
23
-
-
33746696082
-
Bundle Authentication and Authorization Using XML Security in the OSGi Service Platform
-
Washington, DC, USA, IEEE Computer Society
-
H.-Y. Lim, Y.-G. Kim, C.-J. Moon, and D.-K. Baik. Bundle Authentication and Authorization Using XML Security in the OSGi Service Platform. In Proceedings of ICIS '05, pages 502-507, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
Proceedings of ICIS '05
, pp. 502-507
-
-
Lim, H.-Y.1
Kim, Y.-G.2
Moon, C.-J.3
Baik, D.-K.4
-
24
-
-
47749097920
-
Supporting the Secure Deployment of OSGi Bundles
-
IEEE Computer Society, June
-
P. Parrend and S. Frenot. Supporting the Secure Deployment of OSGi Bundles. In Proceedings of WoWMoM 2007. IEEE Computer Society, June 2007.
-
(2007)
Proceedings of WoWMoM 2007
-
-
Parrend, P.1
Frenot, S.2
-
25
-
-
84881225236
-
Enforceable security policies
-
F. B. Schneider. Enforceable security policies. ACM Trans. Inf. Syst. Secur, 3(1):30-50, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
26
-
-
51949092674
-
Language-Based Security for Malicious Mobile Code
-
Technical report, Cornell Univ Ithaca NY
-
F. B. Schneider, D. Kozen, G. Morrisett, and A. Myers. Language-Based Security for Malicious Mobile Code. Technical report, Cornell Univ Ithaca NY, 2003.
-
(2003)
-
-
Schneider, F.B.1
Kozen, D.2
Morrisett, G.3
Myers, A.4
|