Loading...
Please wait, while we are loading the content...
Similar Documents
Enforcing IRM security policies: Two case studies (2009)
| Content Provider | CiteSeerX |
|---|---|
| Author | Jones, Micah Hamlen, Kevin W. |
| File Format | |
| Language | English |
| Publisher Date | 2009-01-01 |
| Publisher Institution | In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI |
| Access Restriction | Open |
| Subject Keyword | Source Code Application-specific Security Policy In-lined Reference Monitor Declarative Language Application Security Policy Irm Security Policy Untrusted Java Application Abstract Spox Case Study Security Policy Xml |
| Content Type | Text |
| Resource Type | Article |