共 50 条
- [21] Object-based data flow testing of Web applications FIRST ASIA-PACIFIC CONFERENCE ON QUALITY SOFTWARE, PROCEEDINGS, 2000, : 7 - 16
- [23] Language-Based Isolation of Untrusted Java']JavaScript PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, : 77 - +
- [24] Modeling and Calculating Capabilities of Composite Web Applications for Assisted End User Development WEB INFORMATION SYSTEMS AND TECHNOLOGIES (WEBIST 2016), 2017, 292 : 58 - 82
- [25] Shielding Applications from an Untrusted Cloud with Haven ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2015, 33 (03):
- [26] An Approach for Securing Critical Applications in Untrusted Clouds 2018 26TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP 2018), 2018, : 436 - 440
- [27] A secure jailing system for confining untrusted applications SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 414 - +
- [29] Providing secure environments for untrusted network applications SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 277 - 283
- [30] Providing secure environments for untrusted network applications Journal of Engineering and Applied Science, 1997, : 277 - 283