Coarse grained Java']Java security policies

被引:0
|
作者
Jensen, T [1 ]
Le Métayer, D [1 ]
Thorn, T [1 ]
机构
[1] Inst Rech Informat & Syst Aleatoires, CNRS, INRIA, F-35042 Rennes, France
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:296 / 296
页数:1
相关论文
共 50 条
  • [1] Extending the Java']Java Virtual Machine to enforce fine-grained security policies in mobile devices
    Ion, Iulia
    Dragovic, Boris
    Crispo, Bruno
    TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 233 - +
  • [2] Inferring Java']Java security policies through dynamic sandboxing
    Inoue, H
    Forrest, S
    PLC '05: Proceedings of the 2005 International Conference on Programming Languages and Compilers, 2005, : 151 - 157
  • [3] CONSCRIPT: Specifying and Enforcing Fine-Grained Security Policies for Java']JavaScript in the Browser
    Meyerovich, Leo A.
    Livshits, Benjamin
    2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : SSS - +
  • [4] Trade-off analysis between security policies for Java']Java mobile codes and requirements for Java']Java application
    Kaiya, H
    Sasaki, K
    Maebashi, Y
    Kaijiri, K
    11TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, PROCEEDINGS, 2003, : 357 - 358
  • [5] Java']Java security
    Foote, B
    IEEE SPECTRUM, 1999, 36 (10) : 6 - +
  • [6] Java']Java security
    Boukanov, I
    DR DOBBS JOURNAL, 1997, 22 (09): : 10 - 10
  • [7] Survey on Java']Java Script security policies and their enforcement mechanisms in a web browser
    Bielova, Nataliia
    JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2013, 82 (08): : 243 - 262
  • [8] CincoSecurity: A Reusable Security Module Based on Fine Grained Roles and Security Profiles for Java']Java EE Applications
    Consuelo Franky, Maria
    Manuel Toro C, Victor
    PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2011), 2011, : 118 - 123
  • [9] Generation of Role Based Access Control Security Policies for Java']Java Collaborative Applications
    Briffaut, J.
    Kauffmann-Tourkestansky, X.
    Lalande, J. -F.
    Smari, W. W.
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 224 - +
  • [10] The evolution of Java']Java security
    Koved, L
    Nadalin, AJ
    Neal, D
    Lawson, T
    IBM SYSTEMS JOURNAL, 1998, 37 (03) : 349 - 364