Author:
Costa Gabriele,Issarny Valérie,Martinelli Fabio,Matteucci Ilaria,Saadi Rachid
Publisher
Springer Berlin Heidelberg
Reference43 articles.
1. Jøsang, A., Keser, C., Dimitrakos, T.: An we manage trust?, pp. 93–107 (2005)
2. Necula, G.C.: Proof-carrying code. In: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Langauges (POPL 1997), pp. 106–119 (1997)
3. Sekar, R., Venkatakrishnan, V., Basu, S., Bhatkar, S., DuVarney, D.C.: Model-carrying code: a practical approach for safe execution of untrusted applications. In: SOSP 2003: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pp. 15–28 (2003)
4. Gong, L.: Java Security: Present and Near Future. IEEE Micro 17(3), 14–19 (1997)
5. Schneider, F.B.: Enforceable security policies. ACM Transactions on Information and System Security 3, 2000 (1998)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献