共 50 条
- [1] Towards practical security monitors of UML policies for mobile applications [J]. EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 278 - 278
- [2] Matching policies with security claims of mobile applications [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 128 - +
- [6] Towards a cooperative security system for mobile-health applications [J]. Electronic Commerce Research, 2019, 19 : 629 - 654
- [7] Towards performance evaluation of mobile systems in UML [J]. MODELLING AND SIMULATION 2003, 2003, : 61 - 68
- [8] Late Breaking Results: Towards Practical Record and Replay for Mobile Applications [J]. PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
- [9] Enforcing non-safety security policies with program monitors [J]. COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 355 - 373
- [10] Towards practical tools for mining abstractions in UML models [J]. ICEIS 2006: PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, 2006, : 276 - +