메뉴 건너뛰기




Volumn 2072 LNCS, Issue , 2001, Pages 256-274

Reflections on MOPs, components, and java security

Author keywords

[No Author keywords available]

Indexed keywords

JAVA PROGRAMMING LANGUAGE;

EID: 84881385185     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45337-7_14     Document Type: Conference Paper
Times cited : (13)

References (32)
  • 2
    • 84982966445 scopus 로고    scopus 로고
    • Reflective authorization systems: Possibilities, benefits, and drawbacks
    • M. Ancona, W. Cazzola, and E. B. Fernandez. Reflective authorization systems: Possibilities, benefits, and drawbacks. Lecture Notes in Computer Science, 1603:35-50, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1603 , pp. 35-50
    • Ancona, M.1    Cazzola, W.2    Fernandez, E.B.3
  • 4
    • 11144223878 scopus 로고    scopus 로고
    • Electronic purse applet certification: Extended abstract
    • Steve Schneider and Peter Ryan, editors, Elsevier Science Publishers
    • Pierre Bieber, Jacques Cazin, Virginie Wiels, Guy Zanon, Pierre Girard, and Jean-Louis Lanet. Electronic purse applet certification: extended abstract. In Steve Schneider and Peter Ryan, editors, Electronic Notes in Theoretical Computer Science, volume 32. Elsevier Science Publishers, 2000.
    • (2000) Electronic Notes in Theoretical Computer Science , vol.32
    • Bieber, P.1    Cazin, J.2    Wiels, V.3    Zanon, G.4    Girard, P.5    Lanet, J.-L.6
  • 5
    • 0032154090 scopus 로고    scopus 로고
    • Towards seamless computing and metacomputing in Java
    • D. Caromel, W. Klauser, and J. Vayssiere. Towards Seamless Computing and Metacomputing in Java. Concurrency Practice and Experience, 10(11-13):1043-1061, November 1998. (Pubitemid 128445453)
    • (1998) Concurrency Practice and Experience , vol.10 , Issue.11-13 , pp. 1043-1061
    • Caromel, D.1    Klauser, W.2    Vayssiere, J.3
  • 9
    • 84957702826 scopus 로고    scopus 로고
    • Reflection for statically typed languages
    • Eric Jul, editor, ECOOP '98-Object-Oriented Programming, Springer
    • José de Oliveira Guimarães. Reflection for statically typed languages. In Eric Jul, editor, ECOOP '98-Object-Oriented Programming, volume 1445 of Lecture Notes in Computer Science, pages 440-461. Springer, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1445 , pp. 440-461
    • De Guimarães, J.O.1
  • 10
    • 84976859535 scopus 로고
    • Computational reflection in class based object-oriented languages
    • October
    • J. Ferber. Computational reflection in class based object-oriented languages. ACM SIGPLAN Notices, 24(10):317-326, October 1989.
    • (1989) ACM SIGPLAN Notices , vol.24 , Issue.10 , pp. 317-326
    • Ferber, J.1
  • 12
    • 0032203850 scopus 로고    scopus 로고
    • Secure Java class loading
    • Li Gong. Secure Java class loading. IEEE Internet Computing, 2(5):56-61, 1998.
    • (1998) IEEE Internet Computing , vol.2 , Issue.5 , pp. 56-61
    • Gong, L.1
  • 24
    • 84956860017 scopus 로고    scopus 로고
    • Meta objects for access control: Role-based principals
    • C. Boyd and E.Dawson, editors, Proceeding of the Third Australasian Conference on Information Security and Privacy, Springer, July
    • T. Riechmann and J. Kleinoeder. Meta objects for access control: Role-based principals. In C. Boyd and E.Dawson, editors, Proceeding of the Third Australasian Conference on Information Security and Privacy, number 1438 in Lecture Notes in Computer Science, pages 296-307. Springer, July 1998.
    • (1998) Lecture Notes in Computer Science , vol.1438 , pp. 296-307
    • Riechmann, T.1    Kleinoeder, J.2
  • 25
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9), September 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 26
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • February
    • Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-based access control models. Computer, 29(2):38-47, February 1996.
    • (1996) Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.S.1    Coyne, E.J.2    Feinstein, H.L.3    Youman, C.E.4
  • 28
    • 23944525025 scopus 로고    scopus 로고
    • Master's thesis, Graduate School of Engineering, University of Tsukuba
    • Michiaki Tatsubori. An extension mechanism for the Java language. Master's thesis, Graduate School of Engineering, University of Tsukuba, 1999.
    • (1999) An Extension Mechanism for the Java Language
    • Tatsubori, M.1
  • 29
    • 84957099353 scopus 로고    scopus 로고
    • From Dalang to Kava - The evolution of a reflective Java extension
    • Pierre Cointe, editor, Proceedings of the second international conference Reflection'99, Springer, July
    • I. Welch and R. Stroud. From Dalang to Kava - the evolution of a reflective Java extension. In Pierre Cointe, editor, Proceedings of the second international conference Reflection'99, number 1616 in Lecture Notes in Computer Science, pages 2-21. Springer, July 1999.
    • (1999) Lecture Notes in Computer Science , vol.1616 , pp. 2-21
    • Welch, I.1    Stroud, R.2
  • 30
    • 84881380158 scopus 로고    scopus 로고
    • Using reflection as a mechanism for enforcing security policies in mobile code
    • Proceedings of ESORICS'2000, October
    • I. Welch and R. J. Stroud. Using reflection as a mechanism for enforcing security policies in mobile code. In Proceedings of ESORICS'2000, number 1895 in Lecture Notes in Computer Science, pages 309-323, October 2000.
    • (2000) Lecture Notes in Computer Science , vol.1895 , pp. 309-323
    • Welch, I.1    Stroud, R.J.2
  • 31


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.