Proceedings of the Second Euromicro Conference on Software Maintenance and Reengineering
DOI: 10.1109/csmr.1998.665751
|View full text |Cite
|
Sign up to set email alerts
|

Protection reconfiguration for reusable software

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…2) was inspired by research in active capabilities [28,17]. The goal is to provide a framework that can support different security models by using ideas of hidden software capabilities [9], 'The proxy principle' [25] and 'Protection Reconfiguration for Reusable Software' [13].…”
Section: Related Workmentioning
confidence: 99%
“…2) was inspired by research in active capabilities [28,17]. The goal is to provide a framework that can support different security models by using ideas of hidden software capabilities [9], 'The proxy principle' [25] and 'Protection Reconfiguration for Reusable Software' [13].…”
Section: Related Workmentioning
confidence: 99%
“…The active software capability model is inspired by work on hidden software capabilities in the SIRAC project at IN-RIA Rhône-Alpes [9,12]. Hidden software capabilities separate security from the functional aspects of an application, by delegating management and exchange of capabilities to protection interfaces interposed between client and server.…”
Section: Proxy-based Securitymentioning
confidence: 99%