MixVM - An Approach to Service Isolation and Data Protection in Mobile Context-Sensitive Applications
暂无分享,去创建一个
[1] Hemma Prafullchandra,et al. Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2 , 1997, USENIX Symposium on Internet Technologies and Systems.
[2] R. Garud,et al. Technological and Organizational Designs for Realizing Economies of Substitution , 1997 .
[3] Stefan Lucks,et al. Dynamic Mobile Anonymity with Mixing , 2006 .
[4] Thomas Risse,et al. A Location-aware Prefetching Mechanism , 2004 .
[5] Grzegorz Czajkowski,et al. Application isolation in the Java Virtual Machine , 2000, OOPSLA '00.
[6] Marcelo d'Amorim,et al. Jeagle: a JAVA Runtime Verification Tool , 2005 .
[7] Edmund M. Clarke,et al. Model Checking , 1999, Handbook of Automated Reasoning.
[8] Daniel E. Geer,et al. Mobile Code Security , 1998, IEEE Internet Comput..
[9] Hans H. Bauer,et al. User requirements for location based services : an analysis on the basis of literature , 2005 .
[10] Eija Kaasinen,et al. User needs for location-aware mobile services , 2003, Personal and Ubiquitous Computing.
[11] X. N. Zhang. Secure Code Distribution , 1997, Computer.
[12] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[13] Ivar Jacobson,et al. The Unified Software Development Process , 1999 .
[14] T. Mitchem,et al. Using kernel hypervisors to secure applications , 1997, Proceedings 13th Annual Computer Security Applications Conference.