Matching in security-by-contract for mobile code.
Nataliia BielovaNicola DragoniFabio MassacciKatsiaryna NaliukaIda Sri Rejeki SiahaanPublished in: J. Log. Algebraic Methods Program. (2009)
Keyphrases
- mobile devices
- information security
- mobile phone
- image matching
- mobile commerce
- graph matching
- matching algorithm
- windows xp
- source code
- mobile computing
- network security
- supply chain
- contractual obligations
- keypoints
- access control
- pattern matching
- matching process
- mobile networks
- security requirements
- mobile payment
- mobile learning
- shape matching
- biometric systems
- mobile environments
- mobile services
- static analysis
- computer security
- intrusion detection
- service management
- java card
- mobile agent system
- context aware