Extensible security architectures for Java
- 1 October 1997
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableThis publication has 18 references indexed in Scilit:
- Safe kernel extensions without run-time checkingPublished by Association for Computing Machinery (ACM) ,1996
- Dealing with disasterPublished by Association for Computing Machinery (ACM) ,1996
- Extensibility safety and performance in the SPIN operating systemPublished by Association for Computing Machinery (ACM) ,1995
- Authentication in the Taos operating systemACM Transactions on Computer Systems, 1994
- Efficient software-based fault isolationPublished by Association for Computing Machinery (ACM) ,1993
- KeyKOS architectureACM SIGOPS Operating Systems Review, 1985
- Capability-based addressingCommunications of the ACM, 1974
- ProtectionACM SIGOPS Operating Systems Review, 1974
- A note on the confinement problemCommunications of the ACM, 1973
- A hardware architecture for implementing protection ringsCommunications of the ACM, 1972