메뉴 건너뛰기




Volumn , Issue , 1998, Pages

Expanding and extending the security features of Java

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); SECURITY SYSTEMS; WEBSITES;

EID: 85084164095     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (12)

References (23)
  • 1
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • Oakland, CA, April
    • D. D. Clark, D. R. Wilson, A Comparison of Commercial and Military Computer Security Policies, IEEE Symposium on Security and Privacy, Oakland, CA, April 1987, pp. 184-194.
    • (1987) IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 3
    • 85084162735 scopus 로고    scopus 로고
    • A secure environment for untrusted helper applications: Confining the wily hacker
    • San Jose, CA, July
    • I. Goldberg, et al, A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker, USENIX Security Symposium, San Jose, CA, July 1996, pp 1-13.
    • (1996) USENIX Security Symposium , pp. 1-13
    • Goldberg, I.1
  • 4
    • 0003313661 scopus 로고    scopus 로고
    • Java security: Present and near future
    • May/June
    • L. Gong, Java Security: Present and Near Future, IEEE Micro paper, 17(3), May/June 1997, pp. 14-19.
    • (1997) IEEE Micro Paper , vol.17 , Issue.3 , pp. 14-19
    • Gong, L.1
  • 7
    • 0030677524 scopus 로고    scopus 로고
    • A logical language for expressing authorizations
    • Oakland, CA, May
    • S. Jajodia, A Logical Language for Expressing Authorizations, IEEE Symposium on Security and Privacy, Oakland, CA, May 1997, pp. 31-42.
    • (1997) IEEE Symposium on Security and Privacy , pp. 31-42
    • Jajodia, S.1
  • 8
    • 77950588719 scopus 로고
    • May
    • JavaSoft, Sun Microsystems, HotJava(tm): The Security Story, May 1995, http://www.javasoft.com:/sfaq/may95/security.html.
    • (1995) HotJava(tm): The Security Story
  • 10
    • 3943088348 scopus 로고    scopus 로고
    • A security model for aglets
    • July/August
    • G. Karjoth et al, A Security Model for Aglets, IEEE Internet Computing, 1(4) July/August 1997.
    • (1997) IEEE Internet Computing , vol.1 , Issue.4
    • Karjoth, G.1
  • 11
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • October
    • B. Lampson, A Note on the Confinement Problem, Communications of the ACM, 16(10), October 1973, pp. 613-615.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.1
  • 12
    • 0029488806 scopus 로고
    • MCF: A Malicious code filter
    • R. Lo, K. Levitt, R. Olsson, MCF: A Malicious Code Filter, Computers & Security 14 (6), 1995, pp. 541-566.
    • (1995) Computers & Security , vol.14 , Issue.6 , pp. 541-566
    • Lo, R.1    Levitt, K.2    Olsson, R.3
  • 13
    • 85077772295 scopus 로고    scopus 로고
    • Fine-grained control of Java applets using a simple constraint language
    • June Also thesis for Master's of Engineering, MIT. June 1997
    • N. V. Mehta, Fine-Grained Control of Java Applets Using a Simple Constraint Language, MIT/LCS/TR-713, June 1997. Also thesis for Master's of Engineering, MIT. June 1997.
    • (1997) MIT/LCS/TR-713
    • Mehta, N.V.1
  • 19
    • 0024125647 scopus 로고
    • Transaction control expressions for separation of duties
    • December
    • R. Sandhu, Transaction Control Expressions for Separation of Duties, 4th Aerospace Computer Security Conference, December 1988, pp. 282-286.
    • (1988) 4th Aerospace Computer Security Conference , pp. 282-286
    • Sandhu, R.1
  • 23
    • 0003224492 scopus 로고    scopus 로고
    • Extensible security architectures for Java
    • St. Malo, France, October
    • D. S. Wallach et al, Extensible Security Architectures for Java, Symposium on Operating Systems Principles, St. Malo, France, October 1997.
    • (1997) Symposium on Operating Systems Principles
    • Wallach, D.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.