Author of the publication

Assessment of Palm OS Susceptibility to Malicious Code Threats.

, , , and . Communications and Multimedia Security, volume 3677 of Lecture Notes in Computer Science, page 240-249. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comparison of two approaches for achieving flexible and adaptive security middleware., , and . Middleware Security, page 19-24. ACM, (2008)Scalable Authorization Middleware for Service Oriented Architectures., , and . ESSoS, volume 6542 of Lecture Notes in Computer Science, page 221-233. Springer, (2011)Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies., , and . REM@ESORICS, volume 197 of Electronic Notes in Theoretical Computer Science, page 31-43. Elsevier, (2007)A Flexible Architecture for Enforcing and Composing Policies in a Service-Oriented Environment., , and . DAIS, volume 4531 of Lecture Notes in Computer Science, page 253-266. Springer, (2007)Assessment of Palm OS Susceptibility to Malicious Code Threats., , , and . Communications and Multimedia Security, volume 3677 of Lecture Notes in Computer Science, page 240-249. Springer, (2005)