Author:
Fong Philip W.L.,Orr Simon
Subject
Computer Networks and Communications,Software
Reference37 articles.
1. Abadi M, Fournet C. Access control based on execution history. In: Proceedings of the 10th annual network and distributed system security symposium (NDSS ’03), San Diego, California, USA, February 2003.
2. Ancona D, Zucca E. True modules for Java-like languages. In: Proceedings of the 15th European conference on object-oriented programming (ECOOP ’01), Budapest, Hungary, June 2001. p. 354–80.
3. Mechanisms for secure modular programming in Java;Bauer;Software—Practice & Experience,2003
4. Bershad BN, Savage S, Pardyak P, Sirer EG, Fiuczynski ME, Becker D, et al. Extensibility, safety and performance in the SPIN operating system. In: Proceedings of the 5th ACM symposium on operating systems principles, Copper Mountain, CO, USA, December 1995. p. 267–84.
5. Bracha G, Ungar D. Mirrors: design principles for meta-level facilities of object-oriented programming languages. In: Proceedings of the 19th ACM conference on object-oriented programming, systems, languages, and applications (OOPSLA ’04), Vancouver, BC, Canada, October 2004. p. 331–44.