Modelling Mobility Aspects of Security Policies
暂无分享,去创建一个
[1] David J. Scott,et al. Spatial Security Policies for Mobile Agents in a Sentient Computing Environment , 2003, FASE.
[2] Pieter H. Hartel,et al. Music2Share - copyright-compliant music sharing in P2P systems , 2004, Proceedings of the IEEE.
[3] Ichiro Satoh,et al. Physical Mobility and Logical Mobility in Ubiquitous Computing Environments , 2002, Mobile Agents.
[4] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[5] Richard Sharp,et al. The Case for Abstracting Security Policies , 2003, Security and Management.
[6] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[7] David A. Wagner,et al. Mimicry attacks on host-based intrusion detection systems , 2002, CCS '02.
[8] Shin Nakajima,et al. The SPIN Model Checker : Primer and Reference Manual , 2004 .
[9] Daniel C. DuVarney,et al. Model-carrying code: a practical approach for safe execution of untrusted applications , 2003, SOSP '03.
[10] Qusay H. Mahmoud. Security Policy: A Design Pattern for Mobile Java Code , 2000 .
[11] Fred B. Schneider,et al. Enforceable security policies , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].