Author:
Bauer Lujo,Appel Andrew W.,Felten Edward W.
Reference26 articles.
1. The Java Seri;Gosling,2000
2. Program fragments, linking, and modularization. 24th ACM SIGPLAN-SIGACT Symposium on the Principles of Programming Languages. ACM Press: New York, NY, 1997; 266-277.
3. The Definition of Standard ML. MIT Press: Boston, MA, 1990.
4. Signing and checking code with Authenticode. http://msdn.microsoft.com/library/en-us/dnauth/html/signfaq.asp [1998 ].
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Resco: Automatic Collection of Leaked Resources;IEICE Transactions on Information and Systems;2013
2. Isolating untrusted software extensions by custom scoping rules;Computer Languages, Systems & Structures;2010-10
3. Using AOP to ensure component interactions in component-based software;2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE);2010-02
4. Composing expressive runtime security policies;ACM Transactions on Software Engineering and Methodology;2009-05
5. Discretionary capability confinement;International Journal of Information Security;2007-09-21