Author of the publication

Java mobile code security by bytecode behavior analysis.

, , , and . IASTED Conf. on Software Engineering and Applications, page 90-95. IASTED/ACTA Press, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Authorization Model and its Mechanism Using Service Paths in Open Distributed Environments., and . DAIS, Chapman & Hall, (1997)Identifying candidate invariant conditions of running program., , , and . IASTED Conf. on Software Engineering and Applications, page 577-582. IASTED/ACTA Press, (2004)Performance Adjustment of an APL Interpreter., and . IEEE Trans. Software Eng., 8 (4): 331-343 (1982)The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 87-A (1): 190-203 (2004)Analyzing Invariant Condition of Running Java Program., , , and . SEKE, page 350-353. (2004)Java Bytecode Dependence Analysis for Secure Information Flow., , , and . Int. J. Netw. Secur., 4 (1): 59-68 (2007)Experimental Polyprocessor System (EPOS) - Operating System.. ISCA, page 196-201. ACM, (1979)Experimental Polyprocessor System (EPOS) - Architecture.. ISCA, page 188-195. ACM, (1979)Flexible User-Definable Performance of Name Resolution Operation in Distributed File Systems., and . SPDP, page 661-664. IEEE Computer Society, (1993)Improving the Reliability of Name Resolution Mechanism in Distributed Operating Systems., , and . ICDCS, page 589-596. IEEE Computer Society, (1992)