共 45 条
- [21] Sam Dog: A Java']Java Sandbox Using a Cascading Access Control List Approach 2011 20TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2011, : 134 - 136
- [22] Using access control for secure information flow in a Java']Java-like language 16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2003, : 155 - 169
- [23] Improving the OI in process control using Java']Java-enhanced integration and access CONTROL SOLUTIONS, 2001, 74 (02): : 87 - 88
- [25] Access to SAP's business framework from Java']Java-based applications CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2001, 13 (07): : 621 - 641
- [26] Providing fine-grained access control for Java']Java programs via binary editing CONCURRENCY-PRACTICE AND EXPERIENCE, 2000, 12 (14): : 1405 - 1430
- [27] Access Privilege Elevation and Revocation in Collusion-Resistant Cloud Access Control PROCEEDINGS OF THE 2018 SECOND WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4), 2018, : 209 - 214
- [28] Role-Based Access Control (RBAC) in Java']Java via Proxy Objects using Annotations SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2010, : 79 - 88
- [29] Method-Specific Java']Java Access Control via RMI Proxy Objects Using Annotations INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2009, 5905 : 301 - 309
- [30] State Crime and Immigration Control in Australia: Jock Serong's On the Java']Java Ridge EUROPEAN LEGACY-TOWARD NEW PARADIGMS, 2021, 26 (7-8): : 735 - 749