Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Memory-Constrained Security Enforcement



Год выпуска: 2009
Автор: Chamseddine Talhi
Издательство: LAP Lambert Academic Publishing
Страниц: 220
ISBN: 9783838320816
Описание
This book aims at investigating memory-constrained security by analyzing the security of Java ME-CLDC and characterizing enforceable security policies. More precisely, the main objectives are (1) evaluating and improving the security of Java ME-CLDC and (2) characterizing memory-constrained execution monitoring; an important class of security mechanisms. We conducted a vulnerability analysis of Java ME-CLDC that revealed the presence of vulnerabilities in the platform and showed how to improve the underlying security model. In addition, we conducted a risk analysis that provided a seriousness estimation of the risks associated with the uncovered vulnerabilities. To characterize memory-constrained execution monitoring, (1) we defined a new automata class, called Bounded History Automata (BHA), to specify memory-constrained EM enforcement, (2) we identified a new memory-directed taxonomy of EM-enforceable properties, and (3) we investigated the enforcement of local properties using...


Похожие книги

  1. Securities Compliance Index. Securities Compliance Index, Second Edition: A Topical Guide To U.S. Securities Regulation. – М.: , 2012. – 512 с.
  2. Susan Echaore-McDavid. Career Opportunities in Law Enforcement, Security, and Protective Services (The Career Opportunities Series). – М.: , 0. – 0 с.
  3. Anne McKinney. Real Resumes for Police, Law Enforcement and Security Jobs: Including Real Resumes Used to Change Careers and Transfer Skills to Other Industries). – М.: , 0. – 0 с.
  4. Julia Lowell, C. R. Neu, Daochi Tong, National Defense Research Institute, National Security Research Institute. Financial Crises and Contagion in Emerging Market Countries. – М.: , 0. – 0 с.
  5. Joseph S. Nye, William A. Owens, James R. Schlesinger, R. James Woolsey, James A. Lewis, Joseph S., Jr. Nye, James Andrew Lewis, Erin Schlather, Csis Commission on Technology Security in the Twenty-First Century. Computer Exports and National Security: New Tools for a New Century : A Report of the Csis Commission on Technology Security in the 21St-Century (Csis Panel Reports.). – М.: , 0. – 0 с.
  6. Committee on Federal Regulation of Securities Committee. The Fund Director's Guidebook: Third Edition (Fund Director's Guidebook). – М.: , 2006. – 128 с.
  7. Susan Echaore-McDavid. Career Opportunities In Law Enforcement, Security And Protective Services (Career Opportunities). – М.: , 2005. – 272 с.
  8. Meridian Securities Market. World Stock Exchange Fact Book. – М.: , 2008. – 0 с.
  9. Daniel Clark. Network Access Control 100 Success Secrets - 100 Most Asked NAC Questions on Implementation and Deployment of unify endpoint security technology, user ... and network security enforcement. – М.: , 2008. – 180 с.
  10. New York, N., Pullman Memorial Universalist Church. Albion. Dedication of the Pullman Memorial Universalist Church: January Thirty-first, 1895, Albion, N.Y. – М.: , 2009. – 32 с.
  11. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  12. Timothy Stapko. Practical Embedded Security: Building Secure Resource-Constrained Systems. – М.: Newnes, 2007. – 480 с.
  13. Glenn Varona. Police Ethics and Governance. – М.: LAP Lambert Academic Publishing, 2012. – 432 с.
  14. Memory Zonde-Kachambwa. Empowered Women in Management: The Case of DWAF, Cape Town, SA. – М.: LAP Lambert Academic Publishing, 2012. – 112 с.
  15. Lionel Ngumuya. Breaking the Dependency Syndrome and Poverty in the Developing World. – М.: LAP Lambert Academic Publishing, 2013. – 132 с.
  16. Memory Mandiudza. Compactness on metric and topological spaces. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  17. Chamseddine Talhi. Memory-Constrained Security Enforcement. – М.: LAP Lambert Academic Publishing, 2009. – 220 с.

Образцы работ

Тема и предметТип и объем работы
Социальная память
Социология
Курсовая работа
30 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Платежные системы в Интернете
Информатика
Диплом
102 стр.
Италия и арабо-исламский мир
Политология
Реферат
19 стр.



Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Елена (Отказавшись от заказа, мы подсказали к кому можно обратиться), 12.08
Огромное Вам спасибо за адресок. Там взялись за мою курсовую и это здорово. Я уже отчаялась найти кого-нибудь - все отказывались