Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1997.Includes bibliographical references (leaves 111-113).by Nimisha V. Mehta.S.B.and M.Eng
Computer security has become a crucial issue in recent years. More than ever, computer scientists, d...
In my thesis, I present three projects on which I have worked during my Ph.D. studies. All of them f...
) Li Gong JavaSoft, Cupertino, California gong@eng.sun.com http://java.sun.com/people/gong/ Decembe...
This paper provides access to information related to Java security. We have customized this informat...
The JavaBeans component model allows users to plug together software components to create Java appli...
A small java program can be embedded in an HTML page. Applets differ from full-fledged java applicat...
A monitoring application, called (Signed) Applet Watch-Dog, is proposed to control the execution of ...
Java, the Java Virtual Machine, and the Java API have captured the imagination of many programmers i...
The convergence of computing and telecommunications technologies has created a need for a dynamic, d...
The original publication is available at www.springerlink.comJava is one of the most famous mobile c...
Defining access control policies for Java applications can be complex. This project investigates me...
This paper explores the problem of protecting a site on the Internet against hostile external Java a...
Ki-Chang Kim. This is an open access article distributed under the Creative Commons Attribution Lice...
Abstract. Programming languages and techniques based on logic and con-straints, such as the Constrai...
AbstractThe paper describes an experiment in which a framework for model checking Java byte code, co...
Computer security has become a crucial issue in recent years. More than ever, computer scientists, d...
In my thesis, I present three projects on which I have worked during my Ph.D. studies. All of them f...
) Li Gong JavaSoft, Cupertino, California gong@eng.sun.com http://java.sun.com/people/gong/ Decembe...
This paper provides access to information related to Java security. We have customized this informat...
The JavaBeans component model allows users to plug together software components to create Java appli...
A small java program can be embedded in an HTML page. Applets differ from full-fledged java applicat...
A monitoring application, called (Signed) Applet Watch-Dog, is proposed to control the execution of ...
Java, the Java Virtual Machine, and the Java API have captured the imagination of many programmers i...
The convergence of computing and telecommunications technologies has created a need for a dynamic, d...
The original publication is available at www.springerlink.comJava is one of the most famous mobile c...
Defining access control policies for Java applications can be complex. This project investigates me...
This paper explores the problem of protecting a site on the Internet against hostile external Java a...
Ki-Chang Kim. This is an open access article distributed under the Creative Commons Attribution Lice...
Abstract. Programming languages and techniques based on logic and con-straints, such as the Constrai...
AbstractThe paper describes an experiment in which a framework for model checking Java byte code, co...
Computer security has become a crucial issue in recent years. More than ever, computer scientists, d...
In my thesis, I present three projects on which I have worked during my Ph.D. studies. All of them f...
) Li Gong JavaSoft, Cupertino, California gong@eng.sun.com http://java.sun.com/people/gong/ Decembe...