Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code.
Ian WelchRobert J. StroudPublished in: ESORICS (2000)
Keyphrases
- security policies
- access control
- access control mechanism
- distributed systems
- network security
- mobile devices
- access control systems
- security concerns
- security management
- mandatory access control
- security requirements
- mobile applications
- access control policies
- source code
- mobile networks
- mobile computing
- multilevel secure
- databases
- dacs scheme
- computing environments
- data model
- machine learning