Export Citations
Abstract
No abstract available.
Cited By
- Huai J, Sun H, Hu C, Zhu Y, Liu Y and Li J (2007). ROST, Future Generation Computer Systems, 23:6, (825-835), Online publication date: 1-Jul-2007.
- Rose E (2019). Lightweight Bytecode Verification, Journal of Automated Reasoning, 31:3-4, (303-334), Online publication date: 15-Jan-2004.
- Beznosov K and Kruchten P Towards agile security assurance Proceedings of the 2004 workshop on New security paradigms, (47-54)
- Kemmerer R Cybersecurity Proceedings of the 25th International Conference on Software Engineering, (705-715)
- Ioannidis S, Bellovin S and Smith J Sub-operating systems Proceedings of the 10th workshop on ACM SIGOPS European workshop, (108-115)
- Ong T, Lim T, Lee B and Yeo C (2002). Unicorn, ACM SIGOPS Operating Systems Review, 36:2, (36-51), Online publication date: 1-Apr-2002.
- Fong P and Cameron R Proof linking Proceedings of the 2001 Symposium on JavaTM Virtual Machine Research and Technology Symposium - Volume 1, (5-5)
- Malkhi D and Reiter M (2000). Secure Execution of Java Applets Using a Remote Playground, IEEE Transactions on Software Engineering, 26:12, (1197-1209), Online publication date: 1-Dec-2000.
- Sirer E and Bershad B (2019). Using production grammars in software testing, ACM SIGPLAN Notices, 35:1, (1-13), Online publication date: 1-Jan-2000.
- Doyon S and Debbabi M Verifying object initialization in the Java bytecode language Proceedings of the 2000 ACM symposium on Applied computing - Volume 2, (821-830)
- Hauswirth M, Kerer C and Kurmanowytsch R A secure execution framework for Java Proceedings of the 7th ACM conference on Computer and Communications Security, (43-52)
- Monden A, Iida H, Matsumoto K, Torii K and Inoue K A Practical Method for Watermarking Java Programs 24th International Computer Software and Applications Conference, (191-197)
- Glew N and Morrisett G Type-safe linking and modular assembly language Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (250-261)
- Beck J, Gefflaut A and Islam N MOCA Proceedings of the 1st ACM international workshop on Data engineering for wireless and mobile access, (62-68)
- Giuri L Role-based access control on the Web using Java Proceedings of the fourth ACM workshop on Role-based access control, (11-18)
- Sirer E and Bershad B Using production grammars in software testing Proceedings of the 2nd conference on Domain-specific languages, (1-13)
- Montgomery M and Krishna K Secure object sharing in java card Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology, (14-14)
- Sirer E and Bershad B Using production grammars in software testing Proceedings of the 2nd conference on Conference on Domain-Specific Languages - Volume 2, (1-1)
- Sirer E, Grimm R, Gregory A and Bershad B (1999). Design and implementation of a distributed virtual machine for networked computers, ACM SIGOPS Operating Systems Review, 33:5, (202-216), Online publication date: 12-Dec-1999.
- Sirer E, Grimm R, Gregory A and Bershad B Design and implementation of a distributed virtual machine for networked computers Proceedings of the seventeenth ACM symposium on Operating systems principles, (202-216)
- Giuri L Role-based access control in Java Proceedings of the third ACM workshop on Role-based access control, (91-100)
- Fong P and Cameron R Proof linking Proceedings of the 6th ACM SIGSOFT international symposium on Foundations of software engineering, (222-230)
- Fong P and Cameron R (2019). Proof linking, ACM SIGSOFT Software Engineering Notes, 23:6, (222-230), Online publication date: 1-Nov-1998.
- Gritzalis S and Aggelis G (1998). Security issues surrounding programming languages for mobile code, ACM SIGOPS Operating Systems Review, 32:2, (16-32), Online publication date: 1-Apr-1998.
- Anupam V and Mayer A Security of web browser scripting languages Proceedings of the 7th conference on USENIX Security Symposium - Volume 7, (15-15)
- Devanbu P, Fong P and Stubblebine S Techniques for trusted software engineering Proceedings of the 20th international conference on Software engineering, (126-135)
- Wallach D, Balfanz D, Dean D and Felten E (1997). Extensible security architectures for Java, ACM SIGOPS Operating Systems Review, 31:5, (116-128), Online publication date: 1-Dec-1997.
- Wallach D, Balfanz D, Dean D and Felten E Extensible security architectures for Java Proceedings of the sixteenth ACM symposium on Operating systems principles, (116-128)
Index Terms
- Java security: hostile applets, holes&antidotes
Please enable JavaScript to view thecomments powered by Disqus.