Author of the publication

Management of Integrity-Enforced Virtual Applications.

, , and . STA Workshops, volume 187 of Communications in Computer and Information Science, page 138-145. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity., , and . INTRUST, volume 6802 of Lecture Notes in Computer Science, page 326-345. Springer, (2010)Dynamic Enforcement of Platform Integrity., , and . TRUST, volume 6101 of Lecture Notes in Computer Science, page 265-272. Springer, (2010)Management of Integrity-Enforced Virtual Applications., , and . STA Workshops, volume 187 of Communications in Computer and Information Science, page 138-145. Springer, (2011)Android Market Analysis with Activation Patterns., , , , , , , and . MobiSec, volume 94 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1-12. Springer, (2011)Android Security Permissions - Can We Trust Them?, , , , , , , and . MobiSec, volume 94 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 40-51. Springer, (2011)