Treffer 61 - 80 von 34.625

61

Montsalvat: Partitioning Java Applications to Minimize the TCB in Intel SGX
Yuhala, Peterson ; Ménétrey, Jämes ; Felber, Pascal ; et al.

Cryptography and Securit...
Report
62

Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object Generation
Cao, Sicong ; Sun, Xiaobing ; Wu, Xiaoxue ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
63

Java security: Issues and implications for library and archival systems
XIANGMIN ZHANG
Library & archival security. 16(2):5-20

Archivage Archival storage Archivado Bibliothèque Library Biblioteca
Fachzeitschrift
65

Tutorial: Principles and Practices of Secure Cryptographic Coding in Java
Xiao, Y. ; Frantz, M. ; Afrose, S. ; et al.
2020 IEEE Secure Development (SecDev) SECDEV Secure Development (SecDev), 2020 IEEE. :5-6 Sep, 2020

Konferenz
67

Challenges of Producing Software Bill Of Materials for Java
Balliu, Musard ; Baudry, Benoit ; Bobadilla, Sofia ; et al.
IEEE Security & Privacy, 2023

Computer Science - Softw... Computer Science - Crypt...
Report
68

Reflections on MOPs, components, and Java security
CAROMEL, Denis ; VAYSSIERE, Julien
ECOOP 2001 : object-oriented programming (Budapest, 18-22 June 2001)Lecture notes in computer science. :256-274

Computer science Informatique Sciences exactes et tech... Exact sciences and techn... Sciences appliquees Applied sciences
Konferenz
69

Jif: Language-based Information-flow Security in Java
Pullicino, Kyle

Computer Science - Progr... Computer Science - Crypt...
Report
70

Inference of Security-Sensitive Entities in Libraries
Lu, Yi ; Bae, Sora ; Krishnan, Padmanabhan ; et al.
2017 IEEE Security and Privacy Workshops (SPW) SPW Security and Privacy Workshops (SPW), 2017 IEEE. :102-109 May, 2017

Konferenz
71

Towards formalizing the Java security architecture of JDK 1.2
KASSAB, L. L ; GREENWALD, S. J
Computer security (Louvain la Neuve, 16-18 September 1998)Lecture notes in computer science. :191-207

Computer science Informatique Sciences exactes et tech... Exact sciences and techn... Sciences appliquees Applied sciences
Konferenz
73

Java Security Vulnerability Analysis Based on Java Access Permission Checking Tree
Young-Chan Lim ; Hyo-Seong Park ; Chul-Woo Park ; et al.
Advanced Science and Technology Letters. :52-55

0202 electrical engineer... 02 engineering and techn...
Fachzeitschrift
74

Technical efficiency among agricultural households and determinants of food security in East Java, Indonesia.
Hakim R ; Haryanto T ; Sari DW
Publisher: Nature Publishing Group Country of Publication: England NLM ID: 101563288 Publication Model: Electronic Cited Medium: Internet ISSN: 2045-2322 (Electronic) Linking ISSN: 20452322 NLM ISO Abbreviation: Sci Rep Subsets: PubMed not MEDLINE; MEDLINE

Fachzeitschrift
75

UMLsecRT: Reactive Security Monitoring of Java Applications with Round-Trip Engineering
Peldszus, Sven ; Bürger, Jens ; Jürjens, Jan

Java model-based development round-trip engineering runtime monitoring Security security by design
Fachzeitschrift
76

Performance Evaluation of Java File Security System (JFSS)
Kahanwal, Brijender ; Singh, Dr. Tejinder Pal ; Tuteja, Dr. R. K.
Pelagia Research Library Advances in Applied Science Research, Vol. 2(6), pp. 254-260, 2011

Computer Science - Opera... Computer Science - Crypt... Computer Science - Perfo...
Report
78

Java Security Architecture Revisited
LI GONG
Communications of the ACM. 54(11):48-52

Computer science Informatique Sciences exactes et tech... Exact sciences and techn... Sciences appliquees Applied sciences
Fachzeitschrift
79

An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities
Sayar, Imen ; Bartel, Alexandre ; Bodden, Eric ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
80

An In-Depth Study of More Than Ten Years of Java Exploitation
Holzinger, Philipp ; Triller, Stefan ; Bartel, Alexandre ; et al.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. :779-790

Konferenz

Filter