The SCEAS System
Navigation Menu

Conferences in DBLP

European Conference on Object-Oriented Programming (ECOOP): Workshops (ecoopw)
1999 (conf/ecoopw/1999secure)

  1. Vipin Swarup, F. Javier Thayer
    Trust: Benefits, Models, and Mechanisms. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:3-18 [Conf]
  2. Martín Abadi
    Protection in Programming-Language Translations. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:19-34 [Conf]
  3. Massimo Ancona, Walter Cazzola, Eduardo B. Fernández
    Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:35-49 [Conf]
  4. Luca Cardelli
    Abstractions for Mobile Computation. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:51-94 [Conf]
  5. Matthew Hennessy, James Riely
    Type-Safe Execution of Mobile Agents in Anonymous Networks. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:95-115 [Conf]
  6. Rocco De Nicola, Gian Luigi Ferrari, Rosario Pugliese
    Types as Specifications of Access Policies. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:118-146 [Conf]
  7. Xavier Leroy, François Rouaix
    Security Properties of Typed Applets. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:147-182 [Conf]
  8. Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
    The Role of Trust Management in Distributed Systems Security. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:185-210 [Conf]
  9. Tuomas Aura
    Distributed Access-Rights Managements with Delegations Certificates. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:211-235 [Conf]
  10. Gerald Brose
    A View-Based Access Control Model for CORBA. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:237-252 [Conf]
  11. Christian F. Tschudin
    Apoptosis - the Programmed Death of Distributed Services. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:253-260 [Conf]
  12. Bennet S. Yee
    A Sanctuary for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:261-273 [Conf]
  13. Volker Roth
    Mutual Protection of Co-operating Agents. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:275-285 [Conf]
  14. Trent Jaeger
    Access Control in Configurable Systems. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:289-316 [Conf]
  15. Robert Grimm, Brian N. Bershad
    Providing Policy-Neutral and Transparent Access Control in Extensible Systems. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:317-338 [Conf]
  16. Michael B. Jones
    Interposition Agents: Transparently Interposing User Code at the System Interface. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:339-368 [Conf]
  17. Thorsten von Eicken, Chi-Chao Chang, Grzegorz Czajkowski, Chris Hawblitzel, Deyu Hu, Dan Spoonhower
    J-Kernel: A Capability-Based Operating System for Java. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:369-393 [Conf]
  18. Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber
    Secure Network Objects. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:395-412 [Conf]
  19. Guy Edjlali, Anurag Acharya, Vipin Chaudhary
    History-Based Access Control for Mobile Code. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:413-431 [Conf]
  20. D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Jonathan M. Smith
    Security in Active Networks. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:433-451 [Conf]
  21. Jarle Hulaas, Alex Villazón, Jürgen Harms
    Using Interfaces to Specify Access Rights. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:453-468 [Conf]
  22. Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán
    Introducing Trusted Third Parties to the Mobile Agent Paradigm. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:469-489 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002