-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
September
-
Martin Abadi, Michael Burrows, Butler Lampson, and Gordon Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706-734, September 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
2
-
-
84982966445
-
Reflective authorization systems: Possibilities, benefits, and drawbacks
-
M. Ancona, W. Cazzola, and E. B. Fernandez. Reflective authorization systems: Possibilities, benefits, and drawbacks. Lecture Notes in Computer Science, 1603:35-50, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1603
, pp. 35-50
-
-
Ancona, M.1
Cazzola, W.2
Fernandez, E.B.3
-
3
-
-
84959045005
-
A history-dependent access control mechanism using reflection
-
Massimo Ancona, Walter Cazzola, and Eduardo B. Fernandez. A history-dependent access control mechanism using reflection. In Proceedings of the 5th ECOOP Workshop on Mobile Object Systems (MOS'99), Lisbon, Portugal, June 1999.
-
Proceedings of the 5th ECOOP Workshop on Mobile Object Systems (MOS'99), Lisbon, Portugal, June 1999
-
-
Ancona, M.1
Cazzola, W.2
Fernandez, E.B.3
-
4
-
-
11144223878
-
Electronic purse applet certification: Extended abstract
-
Steve Schneider and Peter Ryan, editors, Elsevier Science Publishers
-
Pierre Bieber, Jacques Cazin, Virginie Wiels, Guy Zanon, Pierre Girard, and Jean-Louis Lanet. Electronic purse applet certification: extended abstract. In Steve Schneider and Peter Ryan, editors, Electronic Notes in Theoretical Computer Science, volume 32. Elsevier Science Publishers, 2000.
-
(2000)
Electronic Notes in Theoretical Computer Science
, vol.32
-
-
Bieber, P.1
Cazin, J.2
Wiels, V.3
Zanon, G.4
Girard, P.5
Lanet, J.-L.6
-
5
-
-
0032154090
-
Towards seamless computing and metacomputing in Java
-
D. Caromel, W. Klauser, and J. Vayssiere. Towards Seamless Computing and Metacomputing in Java. Concurrency Practice and Experience, 10(11-13):1043-1061, November 1998. (Pubitemid 128445453)
-
(1998)
Concurrency Practice and Experience
, vol.10
, Issue.11-13
, pp. 1043-1061
-
-
Caromel, D.1
Klauser, W.2
Vayssiere, J.3
-
8
-
-
0005372913
-
Automatic program transformation with JOIE
-
Berkeley, USA, June 15-19 USENIX Association
-
Geoff A. Cohen, Jeffrey S. Chase, and David L. Kaminsky. Automatic program transformation with JOIE. In Proceedings of the USENIX 1998 Annual Technical Conference, pages 167-178, Berkeley, USA, June 15-19 1998. USENIX Association.
-
(1998)
Proceedings of the USENIX 1998 Annual Technical Conference
, pp. 167-178
-
-
Cohen, G.A.1
Chase, J.S.2
Kaminsky, D.L.3
-
9
-
-
84957702826
-
Reflection for statically typed languages
-
Eric Jul, editor, ECOOP '98-Object-Oriented Programming, Springer
-
José de Oliveira Guimarães. Reflection for statically typed languages. In Eric Jul, editor, ECOOP '98-Object-Oriented Programming, volume 1445 of Lecture Notes in Computer Science, pages 440-461. Springer, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1445
, pp. 440-461
-
-
De Guimarães, J.O.1
-
10
-
-
84976859535
-
Computational reflection in class based object-oriented languages
-
October
-
J. Ferber. Computational reflection in class based object-oriented languages. ACM SIGPLAN Notices, 24(10):317-326, October 1989.
-
(1989)
ACM SIGPLAN Notices
, vol.24
, Issue.10
, pp. 317-326
-
-
Ferber, J.1
-
11
-
-
0003880013
-
-
Addison Wesley, Reading
-
E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design Patterns: Elements of Reusable Object-oriented Software. Addison Wesley, Reading, 1996.
-
(1996)
Design Patterns: Elements of Reusable Object-oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
12
-
-
0032203850
-
Secure Java class loading
-
Li Gong. Secure Java class loading. IEEE Internet Computing, 2(5):56-61, 1998.
-
(1998)
IEEE Internet Computing
, vol.2
, Issue.5
, pp. 56-61
-
-
Gong, L.1
-
13
-
-
0003801299
-
-
Addison-Wesley, Reading, MA, USA, june
-
Li Gong. Inside Java 2 platform security: architecture, API design, and implementation. Addison-Wesley, Reading, MA, USA, june 1999.
-
(1999)
Inside Java 2 Platform Security: Architecture, API Design, and Implementation
-
-
Gong, L.1
-
14
-
-
0003518498
-
-
Addison-Wesley, Reading, USA
-
J. Gosling, B. Joy, and G. Steele. The Java Language Specification. Addison-Wesley, Reading, USA, 1997.
-
(1997)
The Java Language Specification
-
-
Gosling, J.1
Joy, B.2
Steele, G.3
-
18
-
-
0031702968
-
Channel reification: A reflective model for distributed computation
-
Phoenix, Arizona, USA, Feb
-
Gabriella Dodero Massimo Ancona, Walter Cazzola and Vittoria Gianuzzi. Channel reification: A reflective model for distributed computation. In Proceedings of IEEE International Performance Computing, and Communication Conference (IPCCC'98), pages 32-36, Phoenix, Arizona, USA, Feb 1998.
-
(1998)
Proceedings of IEEE International Performance Computing, and Communication Conference (IPCCC'98)
, pp. 32-36
-
-
Ancona, G.D.M.1
Cazzola, W.2
Gianuzzi, V.3
-
24
-
-
84956860017
-
Meta objects for access control: Role-based principals
-
C. Boyd and E.Dawson, editors, Proceeding of the Third Australasian Conference on Information Security and Privacy, Springer, July
-
T. Riechmann and J. Kleinoeder. Meta objects for access control: Role-based principals. In C. Boyd and E.Dawson, editors, Proceeding of the Third Australasian Conference on Information Security and Privacy, number 1438 in Lecture Notes in Computer Science, pages 296-307. Springer, July 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1438
, pp. 296-307
-
-
Riechmann, T.1
Kleinoeder, J.2
-
25
-
-
0016555241
-
The protection of information in computer systems
-
September
-
Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9), September 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
26
-
-
0030086382
-
Role-based access control models
-
February
-
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-based access control models. Computer, 29(2):38-47, February 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
28
-
-
23944525025
-
-
Master's thesis, Graduate School of Engineering, University of Tsukuba
-
Michiaki Tatsubori. An extension mechanism for the Java language. Master's thesis, Graduate School of Engineering, University of Tsukuba, 1999.
-
(1999)
An Extension Mechanism for the Java Language
-
-
Tatsubori, M.1
-
29
-
-
84957099353
-
From Dalang to Kava - The evolution of a reflective Java extension
-
Pierre Cointe, editor, Proceedings of the second international conference Reflection'99, Springer, July
-
I. Welch and R. Stroud. From Dalang to Kava - the evolution of a reflective Java extension. In Pierre Cointe, editor, Proceedings of the second international conference Reflection'99, number 1616 in Lecture Notes in Computer Science, pages 2-21. Springer, July 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1616
, pp. 2-21
-
-
Welch, I.1
Stroud, R.2
-
30
-
-
84881380158
-
Using reflection as a mechanism for enforcing security policies in mobile code
-
Proceedings of ESORICS'2000, October
-
I. Welch and R. J. Stroud. Using reflection as a mechanism for enforcing security policies in mobile code. In Proceedings of ESORICS'2000, number 1895 in Lecture Notes in Computer Science, pages 309-323, October 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1895
, pp. 309-323
-
-
Welch, I.1
Stroud, R.J.2
|