Memory-Constrained Security Enforcement
Talhi, Chamseddine![Memory-Constrained Security Enforcement](https://support.digitalhusky.com/media/annotations/sorted/550/5500790/CHSBZCOP035500790.jpg)
This book aims at investigating memory-constrained security by analyzing the security of Java ME-CLDC and characterizing enforceable security policies. More precisely, the main objectives are (1) evaluating and improving the security of Java ME-CLDC and (2) characterizing memory-constrained execution monitoring, an important class of security mechanisms. We conducted a vulnerability analysis of Java ME-CLDC that revealed the presence of vulner...