<--- Back to Details
First PageDocument Content
Computing / Software engineering / Computer programming / Programming languages / High-level programming languages / Concurrent programming languages / Java platform / Java / Call stack / Stack / Java Class Library / Go
Date: 2017-04-03 15:58:15
Computing
Software engineering
Computer programming
Programming languages
High-level programming languages
Concurrent programming languages
Java platform
Java
Call stack
Stack
Java Class Library
Go

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 246,47 KB

Share Document on Facebook

Similar Documents

Electromagnetism / Magnetism / Computing / Linear Tape-Open / Linear Tape File System / Spectra Logic / Tape drive / Magnetic tape data storage / Backup / Tape library / Storage Technology Corporation / Computer data storage

Modern Storage for Today’s Data Center Built with maximum flexibility at its core, the Spectra® Stack tape library will meet your backup, archive, and perpetual storage requirements. Designed to be easily installed, e

DocID: 1xULT - View Document

Electromagnetism / Linear Tape-Open / Computing / Spectra Logic / Computer data storage / Tape drive / Backup / LTO / Linear Tape File System

Spectra’s MigrationPass Service: SM An innovative way to preserve your drive and media investment Both Spectra and the Spectra® Stack Tape Library make any migration plan seamless. Tape is designed for long-term data

DocID: 1xUlI - View Document

Cryptocurrencies / Computing / Emerging technologies / Alternative currencies / Blockchains / Technology / Information / Ethereum / Internet of things / Bitcoin / Gateway / ternity

Blockcloud: A Blockchain-based Service-centric Network Stack Zhongxing Ming∗ , Shu Yang† , Qi Li∗ , Dan Wang‡ , Mingwei Xu∗ , Ke Xu∗ , Laizhong Cui† ∗ Dept. of Comp. Sci. & Tech., Tsinghua Univ., Tsinghu

DocID: 1xTXC - View Document

Computing / Cryptography / Cryptographic software / E-commerce / Internet Standards / Internet protocols / Secure communication / Transport Layer Security / Snippet / Microsoft CryptoAPI / Public-key cryptography / Application programming interface

Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security Felix Fischer, Konstantin B¨ottinger, Huang Xiao, Christian Stransky∗ , Yasemin Acar∗ , Michael Backes∗ , Sascha Fahl∗

DocID: 1xTEW - View Document

PDF Document

DocID: 1xpNB - View Document