A flexible security architecture to support third-party applications on mobile devices
暂无分享,去创建一个
Wouter Joosen | Frank Piessens | Fabio Massacci | Dries Vanoverberghe | Lieven Desmet | Katsiaryna Naliuka | Pieter Philippaerts | W. Joosen | F. Massacci | Lieven Desmet | Pieter Philippaerts | Dries Vanoverberghe | K. Naliuka | Frank Piessens
[1] Fabio Massacci,et al. Multi-session Security Monitoring for Mobile Code , 2006 .
[2] Kevin W. Hamlen,et al. Certified In-lined Reference Monitoring on .NET , 2006, PLAS '06.
[3] Daniel C. DuVarney,et al. Model-carrying code: a practical approach for safe execution of untrusted applications , 2003, SOSP '03.
[4] George C. Necula,et al. The design and implementation of a certifying compiler , 1998, PLDI.
[5] David E. Evans,et al. Flexible policy-directed code safety , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[6] Úlfar Erlingsson,et al. The Inlined Reference Monitor Approach to Security Policy Enforcement , 2004 .
[7] Úlfar Erlingsson,et al. IRM enforcement of Java stack inspection , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[8] Fred B. Schneider,et al. Enforceable security policies , 2000, TSEC.
[9] David Walker,et al. A type system for expressive security policies , 2000, POPL '00.
[10] Katsiaryna Naliuka,et al. ConSpec - A Formal Language for Policy Specification , 2008, Electron. Notes Theor. Comput. Sci..
[11] Lujo Bauer,et al. Composing security policies with polymer , 2005, PLDI '05.
[12] Paul Clements,et al. ATAM: Method for Architecture Evaluation , 2000 .