메뉴 건너뛰기




Volumn , Issue , 2002, Pages 76-87

Secure calling contexts for stack inspection

Author keywords

Language Based Security; Linear Temporal Logic; Stack Inspection; Static Program Analysis

Indexed keywords

COMPUTER ARCHITECTURE; CONSTRAINT THEORY; FORMAL LOGIC; SECURITY OF DATA;

EID: 0036989122     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/571157.571166     Document Type: Conference Paper
Times cited : (18)

References (24)
  • 1
    • 0030260329 scopus 로고    scopus 로고
    • Fast Static Analysis of C++ Virtual Function Calls
    • Proc. of OOPSLA '96, New York. ACM Press
    • D. F. Bacon and P. F. Sweeney. Fast Static Analysis of C++ Virtual Function Calls. In Proc. of OOPSLA '96, volume 31(10) of ACM SIGPLAN Notices, pages 324-341, New York, 1996. ACM Press.
    • (1996) ACM SIGPLAN Notices , vol.31 , Issue.10 , pp. 324-341
    • Bacon, D.F.1    Sweeney, P.F.2
  • 6
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction of approximations of fixpoints
    • Los Angeles, CA. ACM Press, New York
    • P. Cousot and R. Cousot. Abstract interpretation: A unified lattice model for static analysis of programs by construction of approximations of fixpoints. In Proc. of 4th ACM Symposium on Principles of Programming Languages, pages 238-252, Los Angeles, CA, 1977. ACM Press, New York.
    • (1977) Proc. of 4th ACM Symposium on Principles of Programming Languages , pp. 238-252
    • Cousot, P.1    Cousot, R.2
  • 9
    • 0001449325 scopus 로고
    • Temporal and modal logic
    • J. van Leeuwen, editor, Amsterdam. Elsevier Science Publishers
    • E. A. Emerson. Temporal and Modal Logic. In J. van Leeuwen, editor, Handbook of Theoretical Computer Science, volume B, pages 996-1072, Amsterdam, 1990. Elsevier Science Publishers.
    • (1990) Handbook of Theoretical Computer Science , vol.B , pp. 996-1072
    • Emerson, E.A.1
  • 12
    • 84887507059 scopus 로고    scopus 로고
    • Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2
    • Dec.
    • L. Gong. Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2. In Proc. of USENIX Symposium on Internet Technologies and Systems, Dec. 1997.
    • (1997) Proc. of USENIX Symposium on Internet Technologies and Systems
    • Gong, L.1
  • 20
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • Preliminary version appeared as Cornell Univ. Tech. Rep. TR 98-1664,1998
    • F. Schneider. Enforceable security policies. ACM Trans. on Information and System Security, 3(1):30-50, 2000. Preliminary version appeared as Cornell Univ. Tech. Rep. TR 98-1664,1998.
    • (2000) ACM Trans. on Information and System Security , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.1
  • 22
    • 84947731286 scopus 로고    scopus 로고
    • An automata-theoretic approach to linear temporal logic
    • Springer-Verlag Inc., New York, NY, USA
    • M. Y. Vardi. An Automata-Theoretic Approach to Linear Temporal Logic, volume 1043 of Lecture Notes in Computer Science, pages 238-266. Springer-Verlag Inc., New York, NY, USA, 1996.
    • (1996) Lecture Notes in Computer Science , pp. 238-266
    • Vardi, M.Y.1
  • 23
    • 0003396725 scopus 로고    scopus 로고
    • PhD thesis, Dept. of Computer Science, Princeton University, Jan.
    • D. S. Wallach. A new approach to mobile code security. PhD thesis, Dept. of Computer Science, Princeton University, Jan. 1999.
    • (1999) A New Approach to Mobile Code Security
    • Wallach, D.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.