Cited By
View all- Horcas JPinto MFuentes LMallouli Wde Oca E(2015)Dynamic Deployment and Monitoring of Security PoliciesTrust, Privacy and Security in Digital Business10.1007/978-3-319-22906-5_14(180-192)Online publication date: 5-Aug-2015
- Marchand de Kerchove FNoyé JSüdholt MHaupt MBockisch CNicolay J(2013)Aspectizing JavaScript securityProceedings of the 3rd workshop on Modularity in systems software10.1145/2451613.2451616(7-12)Online publication date: 25-Mar-2013
- Hussein SMeredith PRoşlu GMaffeis SRezk T(2012)Security-policy monitoring and enforcement with JavaMOPProceedings of the 7th Workshop on Programming Languages and Analysis for Security10.1145/2336717.2336720(1-11)Online publication date: 15-Jun-2012
- Show More Cited By