From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code., и . ESORICS, том 1895 из Lecture Notes in Computer Science, стр. 309-323. Springer, (2000)Runtime Implementation of Aspects Using Kava., и . ECOOP Workshops, том 1743 из Lecture Notes in Computer Science, стр. 303-304. Springer, (1999)Re-engineering Security as a Crosscutting Concern., и . Comput. J., 46 (5): 578-589 (2003)Semantic Analysis of Assurance Cases using s(CASP)., , , , , , , , и . ICLP Workshops, том 3437 из CEUR Workshop Proceedings, CEUR-WS.org, (2023)Kava - Using Byte code Rewriting to add Behavioural Reflection to Java., и . COOTS, стр. 119-130. USENIX, (2001)From Dalang to Kava - The Evolution of a Reflective Java Extension., и . Reflection, том 1616 из Lecture Notes in Computer Science, стр. 2-21. Springer, (1999)A Reflective Java Class Loader., и . ECOOP Workshops, том 1543 из Lecture Notes in Computer Science, стр. 374-375. Springer, (1998)Security-Informed Safety: Supporting Stakeholders with Codes of Practice., , , и . Computer, 51 (8): 60-65 (2018)Kava - a powerful and portable reflective Java (poster session)., и . OOPSLA Addendum, стр. 123-124. ACM, (2000)A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture., , , и . DSN, стр. 453-. IEEE Computer Society, (2004)