空隙 发表于 2025-3-21 17:54:34
书目名称Construction and Analysis of Safe, Secure, and Interoperable Smart Devices影响因子(影响力)<br> http://impactfactor.cn/2024/if/?ISSN=BK0236067<br><br> <br><br>书目名称Construction and Analysis of Safe, Secure, and Interoperable Smart Devices影响因子(影响力)学科排名<br> http://impactfactor.cn/2024/ifr/?ISSN=BK0236067<br><br> <br><br>书目名称Construction and Analysis of Safe, Secure, and Interoperable Smart Devices网络公开度<br> http://impactfactor.cn/2024/at/?ISSN=BK0236067<br><br> <br><br>书目名称Construction and Analysis of Safe, Secure, and Interoperable Smart Devices网络公开度学科排名<br> http://impactfactor.cn/2024/atr/?ISSN=BK0236067<br><br> <br><br>书目名称Construction and Analysis of Safe, Secure, and Interoperable Smart Devices被引频次<br> http://impactfactor.cn/2024/tc/?ISSN=BK0236067<br><br> <br><br>书目名称Construction and Analysis of Safe, Secure, and Interoperable Smart Devices被引频次学科排名<br> http://impactfactor.cn/2024/tcr/?ISSN=BK0236067<br><br> <br><br>书目名称Construction and Analysis of Safe, Secure, and Interoperable Smart Devices年度引用<br> http://impactfactor.cn/2024/ii/?ISSN=BK0236067<br><br> <br><br>书目名称Construction and Analysis of Safe, Secure, and Interoperable Smart Devices年度引用学科排名<br> http://impactfactor.cn/2024/iir/?ISSN=BK0236067<br><br> <br><br>书目名称Construction and Analysis of Safe, Secure, and Interoperable Smart Devices读者反馈<br> http://impactfactor.cn/2024/5y/?ISSN=BK0236067<br><br> <br><br>书目名称Construction and Analysis of Safe, Secure, and Interoperable Smart Devices读者反馈学科排名<br> http://impactfactor.cn/2024/5yr/?ISSN=BK0236067<br><br> <br><br>不成比例 发表于 2025-3-21 22:33:49
History-Based Access Control and Secure Information Flow, control in the form of Abadi and Fournet’s history-based access control mechanism. The Java virtual machine’s permission-based stack inspection mechanism provides dynamic access control and is useful in protecting trusted callees from untrusted callers. In contrast, history-based access control pro臭了生气 发表于 2025-3-22 03:14:59
http://reply.papertrans.cn/24/2361/236067/236067_3.pngconceal 发表于 2025-3-22 07:31:41
http://reply.papertrans.cn/24/2361/236067/236067_4.pngCirrhosis 发表于 2025-3-22 12:07:58
A Mechanism for Secure, Fine-Grained Dynamic Provisioning of Applications on Small Devices,le applications on such devices. This paper presents a simple mechanism for performing such provisioning and updating, even if the applications are mutually distrustful. The mechanism extends CLDC Java.technology with a classfile attribute that carries the certificates necessary to enable the added纬线 发表于 2025-3-22 16:51:53
ESC/Java2: Uniting ESC/Java and JML,e Java Modeling Language (JML). The ESC/Java2 project, whose progress is described in this paper, builds on the final release of ESC/Java from DEC/SRC in several ways. It parses all of JML, thus can be used with the growing body of JML-annotated Java code; it has additional static checking capabilit纬线 发表于 2025-3-22 19:03:22
A Type System for Checking Applet Isolation in Java Card,namic checks in the Java Card Virtual Machine. This paper describes a refined type system for Java Card that enables static checking of applet isolation. With this type system, firewall violations are detected at compile time. Only a special kind of downcast requires dynamic checks.收集 发表于 2025-3-22 23:03:07
Verification of Safety Properties in the Presence of Transactions,ification of . programs considerably more difficult, because they cannot be formalised in a logic based on pre- and postconditions. The KeY system includes an interactive theorem prover for . source code that models the full . standard including transactions. Based on a case study of realistic sizeavenge 发表于 2025-3-23 01:33:51
http://reply.papertrans.cn/24/2361/236067/236067_9.png无聊点好 发表于 2025-3-23 08:45:25
http://reply.papertrans.cn/24/2361/236067/236067_10.png