Treffer 101 - 120 von 34.625

101

Java File Security System (JFSS) Evaluation Using Software Engineering Approaches
Kahanwal, Brijender ; Singh, Tejinder Pal
International Journal of Advanced Research in Computer Science & Software Engineering, 2(1), pp. 132-137, 2012

Computer Science - Softw...
Report
102

Understanding caller-sensitive method vulnerabilities: a class of access control vulnerabilities in the Java platform
Cifuentes, Cristina ; Gross, Andrew ; Keynes, Nathan
Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis. :7-12

Konferenz
103

Data-Driven Vulnerability Detection and Repair in Java Code
Zhang, Ying ; Kabir, Mahir ; Xiao, Ya ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
104

The evolution of Java security
KOVED, L ; NADALIN, A. J ; NEAL, D ; et al.
Java-based and Java-oriented environments, products, and tools from IBM and its Lotus Development Corporation subsidiaryIBM systems journal. 37(3):349-364

Asie Asia Indonésie Indonesia Java Electronics
Fachzeitschrift
106

Java Cryptography Uses in the Wild
Hazhirpasand, Mohammadreza ; Ghafari, Mohammad ; Nierstrasz, Oscar

Computer Science - Crypt... Computer Science - Softw...
Report
107

A flexible access control service for Java mobile code
Corradi, A. ; Montanari, R. ; Lupu, E. ; et al.
Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00) Computer security applications Computer Security Applications, 2000. ACSAC '00. 16th Annual Conference. :356-365 2000

Konferenz
108

Security issues surrounding the Java programming language
GRITZALIS, S ; ILIADIS, J ; OIKONOMOU, V
Global IT security (Vienna, Budapest, 31 August - 2 September 1998). :3-14

Computer science Informatique Telecommunications Télécommunications Sciences exactes et tech... Exact sciences and techn...
Konferenz
109

Applied cryptography in Java
Partida, A. ; Andina, D.
Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303) Security technology Security Technology, 1999. Proceedings. IEEE 33rd Annual 1999 International Carnahan Conference on. :345-348 1999

Konferenz
111

Java Security: Issues and Implications for Library and Archival Systems
Xiangmin Zhang
Library & Archival Security. 16:5-20

05 social sciences 0202 electrical engineer... 02 engineering and techn... 0509 other social scienc... 16. Peace & justice
Fachzeitschrift
113

A proposed paradigm for tracing the effect of security threats in various mobile agent systems
Nasr, Mona M.
2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW) Information Technology: Towards New Smart World (NSITNSW), 2015 5th National Symposium on. :1-8 Feb, 2015

Konferenz
115

Formal development of an embedded verifier for Java Card byte code
Casset, L. ; Burdy, L. ; Requet, A.
Proceedings International Conference on Dependable Systems and Networks Dependable systems and networks Dependable Systems and Networks, 2002. DSN 2002. Proceedings. International Conference on. :51-56 2002

Konferenz
116

Grounded Look at Java Security
Gougher, R.A.
IEEE Software IEEE Softw. Software, IEEE. 15(6):124-125 Jan, 1998

Fachzeitschrift
118

Blocking Java applets at the firewall
Martin, D.M., Jr. ; Rajagopalan, S. ; Rubin, A.D.
Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security Network and distributed system security Network and Distributed System Security, 1997. Proceedings., 1997 Symposium on. :16-26 1997

Konferenz
119

Java Security Architecture Revisited: Hard technical problems and tough business challenges
Li Gong
Queue. 9:30-36

9. Industry and infrastr... 0202 electrical engineer... 02 engineering and techn... 7. Clean energy
Fachzeitschrift
120

A model and design of a security provider for Java applications
Abbasi, A. G. ; Muftic, Sead ; Schmölzer, Gernot ; et al.

E-Ressource

Filter