Security Solutions for Jini-Based Applications
暂无分享,去创建一个
[1] Gary McGraw,et al. Securing Java: getting down to business with mobile code , 1999 .
[2] Denis Pinkas,et al. SESAME: The solution to security for open distributed systems , 1994, Comput. Commun..
[3] Pekka Nikander,et al. Extending Jini with decentralized trust management , 2000 .
[4] Joseph W. Yoder,et al. Architectural Patterns for Enabling Application Security , 1998 .
[5] Thomas Marcus Schoch. An Authentication and Authorization Architecture for Jini Services , 2000 .
[6] Sing Li,et al. Professional Jini , 2000 .
[7] Roy H. Campbell,et al. Secure smart homes using Jini and UIUC SESAME , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] Patrick Brézillon,et al. A Generic Framework for Context-Based Distributed Authorizations , 2003, CONTEXT.
[10] Pekka Nikander,et al. Decentralized Jini Security , 2001, NDSS.
[11] P. Nikander,et al. Securing ad hoc Jini services , 2000 .
[12] Peer Hasselmeyer,et al. Trade-offs in a Secure Jini Service Architecture , 2000, USM.
[13] Markus Schumacher,et al. Security Engineering with Patterns , 2003, Lecture Notes in Computer Science.
[14] Ghita Kouadri Mostéfaoui. Security in Pervasive Environments, What's Next? , 2003, Security and Management.
[15] W. Keith Edwards,et al. Core Jini , 1999 .
[16] Frank Yellin,et al. Low Level Security in Java , 1995, WWW.
[17] Hannes Federrath,et al. Making Jini Secure , 2001 .
[18] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.