Author of the publication

Extensible Security Architecture for Java.

, , , and . SOSP, page 116-128. ACM, (1997)Operating System Review 31(5).

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital Rights Management, Spyware, and Security., and . IEEE Secur. Priv., 4 (1): 18-23 (2006)Chess on a hypercube., and . C³P, page 1329-1341. ACM, (1988)A safe vertex., and . C³P, page 560-564. ACM, (1988)Security Audit of Safeplug "Tor in a Box"., , , and . FOCI, USENIX Association, (2014)Lessons from the Sony CD DRM Episode., and . USENIX Security Symposium, USENIX Association, (2006)Users' conceptions of web security: a comparative study., , , , and . CHI Extended Abstracts, page 746-747. ACM, (2002)Users' conceptions of risks and harms on the web: a comparative study., , , , and . CHI Extended Abstracts, page 614-615. ACM, (2002)Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks?. IEEE Secur. Priv., 1 (3): 60-62 (2003)Mechanisms for secure modular programming in Java., , and . Softw. Pract. Exp., 33 (5): 461-480 (2003)When code isn't law: keynote presentation.. CSLAW, page 1. ACM, (2019)