2009
DOI: 10.1002/spe.v39:5
|View full text |Cite
|
Sign up to set email alerts
|

Untitled

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 62 publications
0
1
0
Order By: Relevance
“…We applied those catalogs to design a hardened OSGi/-Java framework. The [18] article stresses OSGi open-source framework vulnerabilities and expresses guidelines to develop hardened implementations. Yet, some vulnerabilities cannot be controlled at the OSGi framework layer and had to be addressed at the Java Virtual Machine layer.…”
Section: Security Around Osgimentioning
confidence: 99%
“…We applied those catalogs to design a hardened OSGi/-Java framework. The [18] article stresses OSGi open-source framework vulnerabilities and expresses guidelines to develop hardened implementations. Yet, some vulnerabilities cannot be controlled at the OSGi framework layer and had to be addressed at the Java Virtual Machine layer.…”
Section: Security Around Osgimentioning
confidence: 99%