-
1
-
-
52249102788
-
Syntax and semantics of conspec
-
Technical report, S3MS Project
-
I. Aktug. Syntax and semantics of conspec. Technical report, S3MS Project, 2007.
-
(2007)
-
-
Aktug, I.1
-
4
-
-
33846326296
-
Java for mobile devices: A security study
-
IEEE Computer Society
-
M. Debbabi, M. Saleh, C. Talhi, and S. Zhioua. Java for mobile devices: A security study. In Proceedings of the 21st Annual Computer Security Applications Conference (AC-SAC'05), pages 235-244. IEEE Computer Society, 2005.
-
(2005)
Proceedings of the 21st Annual Computer Security Applications Conference (AC-SAC'05)
, pp. 235-244
-
-
Debbabi, M.1
Saleh, M.2
Talhi, C.3
Zhioua, S.4
-
5
-
-
33749048456
-
Security analysis of mobile java
-
IEEE Computer Society
-
M. Debbabi, M. Saleh, C. Talhi, and S. Zhioua. Security analysis of mobile java. In Proceedings of the Sixteenth International Workshop on Database and Expert Systems Applications, 2005, pages 231- 235. IEEE Computer Society, 2005.
-
(2005)
Proceedings of the Sixteenth International Workshop on Database and Expert Systems Applications
, pp. 231-235
-
-
Debbabi, M.1
Saleh, M.2
Talhi, C.3
Zhioua, S.4
-
6
-
-
33645690480
-
Security evaluation of j2me cldc embedded java platform
-
M. Debbabi, M. Saleh, C. Talhi, and S. Zhioua. Security evaluation of j2me cldc embedded java platform. Journal of Object Technolog, 2(5):125-154, 2006.
-
(2006)
Journal of Object Technolog
, vol.2
, Issue.5
, pp. 125-154
-
-
Debbabi, M.1
Saleh, M.2
Talhi, C.3
Zhioua, S.4
-
7
-
-
52249118256
-
D4.2.4 - runtime enforcement architectures
-
Technical report, S3MS Project Deliverables
-
J. Delplancke, F. Martinelli, P. Mori, F. Piesses, and D. Vanoverberghe. D4.2.4 - runtime enforcement architectures. Technical report, S3MS Project Deliverables, 2007. http://www.s3ms.org/index.jsp?doc=179.
-
(2007)
-
-
Delplancke, J.1
Martinelli, F.2
Mori, P.3
Piesses, F.4
Vanoverberghe, D.5
-
8
-
-
47649093926
-
A Security-by-contracts Architecture for Pervasive Services
-
July
-
N. Dragoni, F. Massacci, C. Schaefer, T. Walter, and E. Vetillard. A Security-by-contracts Architecture for Pervasive Services. In 3rd Internation Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007), July 2007.
-
(2007)
3rd Internation Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007
-
-
Dragoni, N.1
Massacci, F.2
Schaefer, C.3
Walter, T.4
Vetillard, E.5
-
9
-
-
0033724116
-
Irm enforcement of java stack inspection
-
Oakland, California, USA, May, IEEE Computer Society
-
U. Erlingsson and F. B. Schneider. Irm enforcement of java stack inspection. In IEEE Symposium on Security and Privacy, page 246, Oakland, California, USA, May 2000. IEEE Computer Society.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 246
-
-
Erlingsson, U.1
Schneider, F.B.2
-
11
-
-
0012682905
-
Security frameworks for open systems: Access control framework
-
ISO, Technical report, ISO/IEC 10181-3
-
ISO. Security frameworks for open systems: Access control framework. Technical report, ISO/IEC 10181-3, 1996.
-
(1996)
-
-
-
12
-
-
52249094325
-
-
JSR 118 Expert Group. Mobile information device profile for Java 2 micro edition. Java Standards Process JSP 118, Java Community Process, http: //jcp.org/aboutJava/communityprocess/final/jsr118/index.html, November 2002.
-
JSR 118 Expert Group. Mobile information device profile for Java 2 micro edition. Java Standards Process JSP 118, Java Community Process, http: //jcp.org/aboutJava/communityprocess/final/jsr118/index.html, November 2002.
-
-
-
-
13
-
-
52249094101
-
-
JSR 118 Expert Group. Security for gsm/umts compliant devices recommended practice. addendum to the mobile information device profile. Java standards process, Java Community Process, http://www.jcp.org/aboutJava/communityprocess/ maintenance/jsr118/, November 2002.
-
JSR 118 Expert Group. Security for gsm/umts compliant devices recommended practice. addendum to the mobile information device profile. Java standards process, Java Community Process, http://www.jcp.org/aboutJava/communityprocess/ maintenance/jsr118/, November 2002.
-
-
-
-
14
-
-
52249088989
-
-
J. Research. Juniper Research Predicts Mobile Games Market to Reach $10bn by 2009, Driven by Emerging Markets and Casual Gamers. Press Release, November 2007. http://www.juniperresearch.com/shop/viewpressrelease. php?pr=63.
-
J. Research. Juniper Research Predicts Mobile Games Market to Reach $10bn by 2009, Driven by Emerging Markets and Casual Gamers. Press Release, November 2007. http://www.juniperresearch.com/shop/viewpressrelease. php?pr=63.
-
-
-
-
15
-
-
52249084269
-
-
C. Riberio and P.Guedes. An access control language for security policies with complex contraints. In In Proceedings of Network and Distributed System Security Symphosium (NDSS01), 2001.
-
C. Riberio and P.Guedes. An access control language for security policies with complex contraints. In In Proceedings of Network and Distributed System Security Symphosium (NDSS01), 2001.
-
-
-
-
18
-
-
52249115518
-
-
Sun Microsystems Inc. The connectected limited device configuration specification, March 2003
-
Sun Microsystems Inc. The connectected limited device configuration specification. Java Standards Process JSR 139, Java Community Process, http://jcp.org/aboutJava/communityprocess/final/jsr139/index.html, March 2003.
-
Java Standards Process JSR 139, Java Community Process
-
-
|