Login / Signup
Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application.
Haruhiko Kaiya
Kouta Sasaki
Yasunori Maebashi
Kenji Kaijiri
Published in:
RE (2003)
Keyphrases
</>
trade off
security policies
java programs
java applets
security requirements
source code
data analysis
access control systems
database applications
open source
programming language
information systems
mobile phone
web applications
information security
cross platform
object oriented
data model