共 50 条
- [4] Extending the deployment of Java']Java platform [J]. CONTROL AND INSTRUMENTATION, 1999, 31 (02): : 23 - 23
- [7] Extending operational semantics of the Java']Java bytecode [J]. TRUSTWORTHY GLOBAL COMPUTING, 2008, 4912 : 57 - 72
- [8] Java']Java security extensions for a Java']Java server in a hostile environment [J]. 17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 64 - 73
- [9] Extending the Java']Java Virtual Machine to enforce fine-grained security policies in mobile devices [J]. TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 233 - +
- [10] Application of Java']Java Security Architecture in Information Security [J]. PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE OF MODELLING AND SIMULATION, VOL III: MODELLING AND SIMULATION IN ELECTRONICS, COMPUTING, AND BIO-MEDICINE, 2008, : 66 - 69