<--- Back to Details
First PageDocument Content
Computing / Software engineering / Computer programming / Programming languages / High-level programming languages / Concurrent programming languages / Java platform / Java / Call stack / Stack / Java Class Library / Go
Date: 2017-04-03 15:58:15
Computing
Software engineering
Computer programming
Programming languages
High-level programming languages
Concurrent programming languages
Java platform
Java
Call stack
Stack
Java Class Library
Go

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 246,47 KB

Share Document on Facebook

Similar Documents

Functional Programming for Compiling and Decompiling Computer-Aided Design

Functional Programming for Compiling and Decompiling Computer-Aided Design

DocID: 1xW3j - View Document

Programming with “Big Code”: Lessons, Techniques and Applications Pavol Bielik1 , Veselin Raychev1 , and Martin Vechev1 1  Department of Computer Science, ETH Zurich, Switzerland

Programming with “Big Code”: Lessons, Techniques and Applications Pavol Bielik1 , Veselin Raychev1 , and Martin Vechev1 1 Department of Computer Science, ETH Zurich, Switzerland

DocID: 1xVVx - View Document

A Case for Query-driven Predicate Answer Set Programming (Position Paper) Gopal Gupta Elmer Salazar, Kyle Marple, Zhuo Chen, Farhad Shakerin Department of Computer Science The University of Texas at Dallas

A Case for Query-driven Predicate Answer Set Programming (Position Paper) Gopal Gupta Elmer Salazar, Kyle Marple, Zhuo Chen, Farhad Shakerin Department of Computer Science The University of Texas at Dallas

DocID: 1xVE0 - View Document

Science of Computer Programming, 14(2-3), 1990, ppAlgorithm Theories and Design Tactics Douglas R. Smith and Michael R. Lowry Kestrel Institute 3260 Hillview Avenue

Science of Computer Programming, 14(2-3), 1990, ppAlgorithm Theories and Design Tactics Douglas R. Smith and Michael R. Lowry Kestrel Institute 3260 Hillview Avenue

DocID: 1xVuR - View Document

A Breadth-First Course in Multicore and Manycore Programming Suzanne Rivoire Sonoma State University Department of Computer Science

A Breadth-First Course in Multicore and Manycore Programming Suzanne Rivoire Sonoma State University Department of Computer Science

DocID: 1xTRO - View Document