Enforcing security policies in open source JVM

被引:0
|
作者
Wei, Da [1 ]
Jin, Ying [1 ]
Zhang, Jing [1 ]
Zheng, Xiao-Juan [2 ]
Li, Zhuo [1 ]
机构
[1] College of Computer Science and Technology, Jilin University, Changchun 130012, China
[2] Software College, Northeast Normal University, Changchun 130117, China
来源
Tien Tzu Hsueh Pao/Acta Electronica Sinica | 2009年 / 37卷 / SUPPL.期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:36 / 41
相关论文
共 50 条
  • [1] Enforcing messaging security policies
    Likavec, J
    Wolthusen, SD
    THIRD IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2005, : 131 - 138
  • [2] Enforcing Security Policies on Programs
    Ould-Slimane, Hakima
    Mejri, Mohamed
    Adi, Kamel
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2006, 147 : 195 - +
  • [3] Enforcing security policies via types
    Gorla, D
    Pugliese, R
    SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 86 - 100
  • [4] Enforcing security policies on interacting authentication systems
    Buccafurri, Francesco
    De Angelis, Vincenzo
    Lazzaro, Sara
    Pugliese, Andrea
    COMPUTERS & SECURITY, 2024, 140
  • [5] Enforcing Multilevel Security Policies in Unstable Networks
    Burke, Quinn
    Mehmeti, Fidan
    George, Rahul
    Ostrowski, Kyle
    Jaeger, Trent
    La Porta, Thomas F.
    McDaniel, Patrick
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (03): : 2349 - 2365
  • [6] ESPOONERBAC: Enforcing security policies in outsourced environments
    Asghar, Muhammad Rizwan
    Ion, Mihaela
    Russello, Giovanni
    Crispo, Bruno
    COMPUTERS & SECURITY, 2013, 35 : 2 - 24
  • [7] Tool Support for Enforcing Security Policies on Databases
    Abramov, Jenny
    Anson, Omer
    Sturm, Arnon
    Shoval, Peretz
    IS OLYMPICS: INFORMATION SYSTEMS IN A DIVERSE WORLD, 2012, 107 : 126 - +
  • [8] Enforcing Security Policies Using Algebraic Approach
    Mejri, Mohamed
    Fujita, Hamido
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2008, 182 : 84 - +
  • [9] Enforcing security policies for distributed objects applications
    Popescu, BC
    Crispo, B
    Tanenbaum, AS
    Zeeman, M
    SECURITY PROTOCOLS, 2005, 3364 : 119 - 133
  • [10] Enforcing Multiple Security Policies for Android System
    Guo, Tao
    Zhang, Puhan
    Liang, Hongliang
    Shao, Shuai
    PROCEEDINGS OF THE 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER, COMMUNICATION, CONTROL AND AUTOMATION, 2013, 68 : 165 - 169