History-based access control for mobile code
- 1 November 1998
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableThis publication has 10 references indexed in Scilit:
- The Chinese Wall security policyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Dynamic program instrumentation for scalable performance toolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Automated detection of vulnerabilities in privileged programs by execution monitoringPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Javelin: Internet-based parallel computing using JavaConcurrency: Practice and Experience, 1997
- Extensible security architectures for JavaPublished by Association for Computing Machinery (ACM) ,1997
- A unified framework for enforcing multiple access control policiesPublished by Association for Computing Machinery (ACM) ,1997
- Using content-derived names for configuration managementPublished by Association for Computing Machinery (ACM) ,1997
- Joint actions based authorization schemesACM SIGOPS Operating Systems Review, 1996
- Extensibility safety and performance in the SPIN operating systemPublished by Association for Computing Machinery (ACM) ,1995
- Interposition agentsPublished by Association for Computing Machinery (ACM) ,1993