Conferences in DBLP
Vipin Swarup , F. Javier Thayer Trust: Benefits, Models, and Mechanisms. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:3-18 [Conf ] Martín Abadi Protection in Programming-Language Translations. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:19-34 [Conf ] Massimo Ancona , Walter Cazzola , Eduardo B. Fernández Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:35-49 [Conf ] Luca Cardelli Abstractions for Mobile Computation. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:51-94 [Conf ] Matthew Hennessy , James Riely Type-Safe Execution of Mobile Agents in Anonymous Networks. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:95-115 [Conf ] Rocco De Nicola , Gian Luigi Ferrari , Rosario Pugliese Types as Specifications of Access Policies. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:118-146 [Conf ] Xavier Leroy , François Rouaix Security Properties of Typed Applets. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:147-182 [Conf ] Matt Blaze , Joan Feigenbaum , Angelos D. Keromytis The Role of Trust Management in Distributed Systems Security. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:185-210 [Conf ] Tuomas Aura Distributed Access-Rights Managements with Delegations Certificates. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:211-235 [Conf ] Gerald Brose A View-Based Access Control Model for CORBA. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:237-252 [Conf ] Christian F. Tschudin Apoptosis - the Programmed Death of Distributed Services. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:253-260 [Conf ] Bennet S. Yee A Sanctuary for Mobile Agents. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:261-273 [Conf ] Volker Roth Mutual Protection of Co-operating Agents. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:275-285 [Conf ] Trent Jaeger Access Control in Configurable Systems. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:289-316 [Conf ] Robert Grimm , Brian N. Bershad Providing Policy-Neutral and Transparent Access Control in Extensible Systems. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:317-338 [Conf ] Michael B. Jones Interposition Agents: Transparently Interposing User Code at the System Interface. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:339-368 [Conf ] Thorsten von Eicken , Chi-Chao Chang , Grzegorz Czajkowski , Chris Hawblitzel , Deyu Hu , Dan Spoonhower J-Kernel: A Capability-Based Operating System for Java. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:369-393 [Conf ] Leendert van Doorn , Martín Abadi , Michael Burrows , Edward Wobber Secure Network Objects. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:395-412 [Conf ] Guy Edjlali , Anurag Acharya , Vipin Chaudhary History-Based Access Control for Mobile Code. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:413-431 [Conf ] D. Scott Alexander , William A. Arbaugh , Angelos D. Keromytis , Jonathan M. Smith Security in Active Networks. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:433-451 [Conf ] Jarle Hulaas , Alex Villazón , Jürgen Harms Using Interfaces to Specify Access Rights. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:453-468 [Conf ] Uwe G. Wilhelm , Sebastian Staamann , Levente Buttyán Introducing Trusted Third Parties to the Mobile Agent Paradigm. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:469-489 [Conf ]