Security monitor inlining for multithreaded Java

Conference object, Article English OPEN
Dam M.; Jacobs B.; Lundblad A.; Piessens F.;
(2009)

Program monitoring is a well-established and efficient approach to security policy enforcement. An implementation of program monitoring that is particularly appealing for application-level policy enforcement is monitor inlining: the application is rewritten to push moni... View more
Share - Bookmark

  • Download from
    Lirias via Lirias (Conference object, 2009)
  • Funded by
  • Related to
    FET FP7-> FET Proactive: FET proactive: ICT forever yours
    FET FP7-> FET Proactive: Highly Adaptable and Trustworthy Software using Formal Models
  • Cite this publication