메뉴 건너뛰기




Volumn 9, Issue 3, 2001, Pages 217-250

Model checking security properties of control flow graphs

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; ELECTRONIC COMMERCE; FINITE AUTOMATA; JAVA PROGRAMMING LANGUAGE; LOGIC PROGRAMMING; SEMANTICS; THEOREM PROVING;

EID: 0034963556     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2001-9303     Document Type: Article
Times cited : (57)

References (42)
  • 4
    • 0003884049 scopus 로고    scopus 로고
    • Semantics of Java byte code
    • Department of Information Technology, Technical University of Denmark, March
    • (1997) Technical Report
    • Bertelsen, P.1
  • 15
    • 85037420988 scopus 로고    scopus 로고
    • JavaSoft. Java Development Kit 1.2, URL
    • (1998)
  • 23
    • 85037418586 scopus 로고    scopus 로고
    • General Magic, The Telescript home page
    • (1996)
  • 28
  • 32
    • 4244051608 scopus 로고    scopus 로고
    • Verification de politiques de sécurité par analyse de programmes
    • PhD thesis, Université de Rennes I, February
    • (1999)
    • Thorn, T.1
  • 38
    • 0003396725 scopus 로고    scopus 로고
    • A new approach to mobile code security
    • PhD thesis, Dept. of Computer Science, Princeton University, January
    • (1999)
    • Wallach, D.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.