Enforcing security policies in open source JVM

被引:0
|
作者
Wei, Da [1 ]
Jin, Ying [1 ]
Zhang, Jing [1 ]
Zheng, Xiao-Juan [2 ]
Li, Zhuo [1 ]
机构
[1] College of Computer Science and Technology, Jilin University, Changchun 130012, China
[2] Software College, Northeast Normal University, Changchun 130117, China
来源
Tien Tzu Hsueh Pao/Acta Electronica Sinica | 2009年 / 37卷 / SUPPL.期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:36 / 41
相关论文
共 50 条
  • [31] Is Open Source Security a Myth?
    Schryen, Guido
    COMMUNICATIONS OF THE ACM, 2011, 54 (05) : 130 - +
  • [32] Security and trust in open source security tokens
    Schink M.
    Wagner A.
    Unterstein F.
    Heyszl J.
    1600, Ruhr-University of Bochum (2021): : 176 - 201
  • [33] SurgeScan: Enforcing Security Policies on Untrusted Third-Party Android Libraries
    Vronsky, Jonathan
    Stevens, Ryan
    Chen, Hao
    2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [34] The RAppArmor Package: Enforcing Security Policies in R Using Dynamic Sandboxing on Linux
    Ooms, Jeroen
    JOURNAL OF STATISTICAL SOFTWARE, 2013, 55 (07): : 1 - 34
  • [35] Enforcing Multilevel Security Policies in Database-Defined Networks using Row-Level Security
    Al-Haj, Ali
    Aziz, Benjamin
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON NETWORKED SYSTEMS (NETSYS 2019), 2019, : 42 - 47
  • [36] A Security PaaS Container with a Customized JVM
    Lin, Rongheng
    Wu, Budan
    Su, Sen
    Xu, Peng
    Yang, ShaSha
    Zhao, Yao
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 960 - 961
  • [37] CONSCRIPT: Specifying and Enforcing Fine-Grained Security Policies for Java']JavaScript in the Browser
    Meyerovich, Leo A.
    Livshits, Benjamin
    2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : SSS - +
  • [38] Modeling and Enforcing Security and Service Control Policies using FlexRFID Middleware Healthcare Scenarios
    El Khaddar, Mehdia Ajana
    Chraibi, Mhammed
    Harroud, Hamid
    Boulmalf, Mohammed
    Elkoutbi, Mohammed
    Maach, Abdelilah
    2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 461 - 467
  • [39] Security Challenges of Formulating, Implementing, and Enforcing Parental/Youth Escort Policies in Shopping Malls
    Gotham, Kevin Fox
    JOURNAL OF APPLIED SECURITY RESEARCH, 2021, 16 (03) : 307 - 327
  • [40] Security of Open Source Web Applications
    Walden, James
    Doyle, Maureen
    Welch, Grant A.
    Whelan, Michael
    ESEM: 2009 3RD INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT, 2009, : 546 - 554