메뉴 건너뛰기




Volumn 27, Issue 2, 2005, Pages 344-382

A systematic approach to static access control

Author keywords

Access control; Stack inspection; Type systems

Indexed keywords

ACCESS CONTROL; STACK INSPECTION; TYPE SYSTEMS;

EID: 27844549441     PISSN: 01640925     EISSN: 01640925     Source Type: Journal    
DOI: 10.1145/1057387.1057392     Document Type: Article
Times cited : (31)

References (46)
  • 1
    • 85017248930 scopus 로고    scopus 로고
    • Program analysis using mixed term and set constraints
    • AIKEN, A. S. AND FÄHNDRICH, M. 1997. Program analysis using mixed term and set constraints. In Static Analysis Symposium (SAS). 114-126. URL: http://www.cs.berkeley.edu/~aiken/publications/papers/sas97.ps.
    • (1997) Static Analysis Symposium (SAS) , pp. 114-126
    • Aiken, A.S.1    Fähndrich, M.2
  • 3
    • 0004312442 scopus 로고    scopus 로고
    • A simple semantics and static analysis for Java security
    • Stevens Institute of Technology. June.
    • BANERJEE, A. AND NAUMANN, D. A. 2001. A simple semantics and static analysis for Java security. Tech. Rep. 2001-1, Stevens Institute of Technology. June. URL: http://guinness.cs.stevens-tech.edu/~naumann/publications/tr2001.ps.
    • (2001) Tech. Rep. , vol.2001 , Issue.1
    • Banerjee, A.1    Naumann, D.A.2
  • 4
    • 18944377182 scopus 로고    scopus 로고
    • Static analysis for stack inspection
    • Electronic Notes in Theoretical Computer Science. Elsevier Science, Amsterdam, The Netherlands
    • BARTOLETTI, M., DEGANO, P., AND FERRARI, G. 2001. Static analysis for stack inspection. In International Workshop on Concurrency and Coordination. Electronic Notes in Theoretical Computer Science, vol. 54. Elsevier Science, Amsterdam, The Netherlands.
    • (2001) International Workshop on Concurrency and Coordination , vol.54
    • Bartoletti, M.1    Degano, P.2    Ferrari, G.3
  • 6
    • 0034963556 scopus 로고    scopus 로고
    • Model checking security properties of control flow graphs
    • BESSON, F., JENSEN, T. P., LE MÉTAYER, D., AND THORN, T. 2001. Model checking security properties of control flow graphs. Journal of Computer Security 9, 3, 217-250. URL: http://www.irisa.fr/lande/jensen/jcs.pdf.
    • (2001) Journal of Computer Security , vol.9 , Issue.3 , pp. 217-250
    • Besson, F.1    Jensen, T.P.2    Le Métayer, D.3    Thorn, T.4
  • 7
    • 21144446851 scopus 로고    scopus 로고
    • A tail-recursive semantics for stack inspections
    • Lecture Notes in Computer Science. Springer-Verlag, New York
    • CLEMENTS, J. AND FELLEISEN, M. 2003. A tail-recursive semantics for stack inspections. In Proceedings of the European Symposium on Programming (ESOP). Lecture Notes in Computer Science, vol. 2618. Springer-Verlag, New York, 22-37. URL: http://www.ccs.neu.edu/scheme/pubs/esop2003-cf.ps.gz.
    • (2003) Proceedings of the European Symposium on Programming (ESOP) , vol.2618 , pp. 22-37
    • Clements, J.1    Felleisen, M.2
  • 15
    • 84940106252 scopus 로고    scopus 로고
    • Verifying security properties of control-flow graphs
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • JENSEN, T., LE MÈTAYER, D., AND THORN, T. 1999. Verifying security properties of control-flow graphs. In Proceedings of the IEEE Symposium on Security and Privacy (S&P). IEEE Computer Society Press, Los Alamitos, Calif., 89-105. URL: http://www.irisa.fr/lande/jensen/papers/SP99.ps.
    • (1999) Proceedings of the IEEE Symposium on Security and Privacy (S&P) , pp. 89-105
    • Jensen, T.1    Le Mètayer, D.2    Thorn, T.3
  • 18
    • 0024927385 scopus 로고
    • Computational λ-calculus and monads
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • MOGGI, E. 1989. Computational λ-calculus and monads. In Proceedings of the IEEE Symposium on Logic in Computer Science (LICS). IEEE Computer Society Press, Los Alamitos, Calif., 14-23. URL: http://www.disi.unige. it/person/MoggiE/ftp/lics89.ps.gz.
    • (1989) Proceedings of the IEEE Symposium on Logic in Computer Science (LICS) , pp. 14-23
    • Moggi, E.1
  • 20
    • 0032761040 scopus 로고    scopus 로고
    • Type inference with constrained types
    • ODERSKY, M., SULZMANN, M., AND WEHR, M. 1999. Type inference with constrained types. Theory Pract. Obj. Syst. 5, 1, 35-55. URL: http://www.comp.nus.edu.sg/~sulzmann/publications/tapos.ps.
    • (1999) Theory Pract. Obj. Syst. , vol.5 , Issue.1 , pp. 35-55
    • Odersky, M.1    Sulzmann, M.2    Wehr, M.3
  • 21
    • 0038037654 scopus 로고    scopus 로고
    • Type-based analysis of uncaught exceptions
    • PESSAUX, F. AND LEROY, X. 2000. Type-based analysis of uncaught exceptions. ACM Trans. Prog. Lang. Syst. 22, 2, 340-377. URL: http://pauillac.inria.fr/~xleroy/publi/exceptions-toplas.ps.gz.
    • (2000) ACM Trans. Prog. Lang. Syst. , vol.22 , Issue.2 , pp. 340-377
    • Pessaux, F.1    Leroy, X.2
  • 23
    • 0042500274 scopus 로고    scopus 로고
    • A versatile constraint-based type inference system
    • POTTIER, F. 2000. A versatile constraint-based type inference system. Nordic J. Comput. 7, 4 (Nov.), 312-347. URL: http://pauillac.inria.fr/~fpottier/ publis/fpottier-njc-2000.ps.gz.
    • (2000) Nordic J. Comput. , vol.7 , Issue.4 NOV , pp. 312-347
    • Pottier, F.1
  • 24
    • 0041967308 scopus 로고    scopus 로고
    • A constraint-based presentation and generalization of rows
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • POTTIER, F. 2003. A constraint-based presentation and generalization of rows. In Proceedings of the IEEE Symposium on Logic in Computer Science (LICS). IEEE Computer Society Press, Los Alamitos, Calif., 331-340. URL: http://pauillac.inria.fr/~fpottier/publis/fpottier-lics03.ps.gz.
    • (2003) Proceedings of the IEEE Symposium on Logic in Computer Science (LICS) , pp. 331-340
    • Pottier, F.1
  • 26
    • 84945270736 scopus 로고    scopus 로고
    • A systematic approach to static access control
    • Lecture Notes in Computer Science. Springer-Verlag, New York
    • POTTIER, F., SKALKA, C., AND SMITH, S. 2001. A systematic approach to static access control. In Proceedings of the European Symposium on Programming (ESOP). Lecture Notes in Computer Science, vol. 2028. Springer-Verlag, New York, 30-45. URL: http://pauillac.inria.fr/~fpottier/publis/fpottier-skalka-smith- esop01.ps.gz.
    • (2001) Proceedings of the European Symposium on Programming (ESOP) , vol.2028 , pp. 30-45
    • Pottier, F.1    Skalka, C.2    Smith, S.3
  • 27
    • 0004526324 scopus 로고
    • Extending ML type system with a sorted equational theory
    • INRIA, Rocquencourt, BP 105, 78153 Le Chesnay Cedex, France
    • RÉMY, D. 1992a. Extending ML type system with a sorted equational theory. Tech. Rep. 1766, INRIA, Rocquencourt, BP 105, 78153 Le Chesnay Cedex, France. URL: ftp://ftp.inria.fr/INRIA/Projects/cristal/Didier.Remy/eq-theory-on- types.ps.gz.
    • (1992) Tech. Rep. , vol.1766
    • Rémy, D.1
  • 29
    • 1542766965 scopus 로고
    • Type inference for records in a natural extension of ML
    • C. A. Gunter and J. C. Mitchell, Eds. MIT Press, Cambridge, Mass.
    • RÉMY, D. 1994. Type inference for records in a natural extension of ML. In Theoretical Aspects of Object-Oriented Programming. Types, Semantics and Language Design, C. A. Gunter and J. C. Mitchell, Eds. MIT Press, Cambridge, Mass. URL: ftp://ftp.inria.fr/INRIA/Projects/cristal/Didier.Remy/taoopl.ps.gz.
    • (1994) Theoretical Aspects of Object-oriented Programming. Types, Semantics and Language Design
    • Rémy, D.1
  • 30
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • SCHNEIDER, F. B. 2000. Enforceable security policies. ACM Trans. Inf. Syst. Sec. 3, 1 (Feb.), 1-50. URL: http://www.cs.cornell.edu/fbs/publications/ EnfSecPols.pdf.
    • (2000) ACM Trans. Inf. Syst. Sec. , vol.3 , Issue.1 FEB , pp. 1-50
    • Schneider, F.B.1
  • 31
    • 27844456277 scopus 로고    scopus 로고
    • Type inference with structural subtyping: A faithful formalization of an efficient constraint solver
    • SIMONET, V. 2003. Type inference with structural subtyping: a faithful formalization of an efficient constraint solver. In Proceedings of the Asian Symposium on Programming Languages and Systems. URL: http://cristal.inria.fr/ ~simonet/publis/simonet-structural-subtyping.ps.gz.
    • (2003) Proceedings of the Asian Symposium on Programming Languages and Systems
    • Simonet, V.1
  • 32
    • 14844285027 scopus 로고    scopus 로고
    • Ph.D. dissertation. The Johns Hopkins University
    • SKALKA, C. 2002. Types for programming language-based security. Ph.D. dissertation. The Johns Hopkins University. URL: http://www.cs.uvn.edu/~skalka/ skalka-pubs/skalka-phdthesis.ps.
    • (2002) Types for Programming Language-based Security
    • Skalka, C.1
  • 33
    • 14844312689 scopus 로고    scopus 로고
    • Syntactic type soundness for HM(X)
    • Electronic Notes in Theoretical Computer Science 75
    • SKALKA, C. AND POTTIER, F. 2002. Syntactic type soundness for HM(X). In Proceedings of the Workshop on Types in Programming (TIP). Electronic Notes in Theoretical Computer Science, vol. 75. URL: http://pauillac.inria.fr/~fpottier/ publis/skalka-fpottier-tip-02.ps.gz.
    • (2002) Proceedings of the Workshop on Types in Programming (TIP)
    • Skalka, C.1    Pottier, F.2
  • 35
    • 0025448350 scopus 로고
    • A functional theory of exceptions
    • SPIVEY, M. 1990. A functional theory of exceptions. Sci. Comput. Prog. 14, 25-42.
    • (1990) Sci. Comput. Prog. , vol.14 , pp. 25-42
    • Spivey, M.1
  • 36
    • 84945287015 scopus 로고    scopus 로고
    • Entailment with conditional equality constraints
    • Lecture Notes in Computer Science. Springer-Verlag
    • SU, Z. AND AIKEN, A. 2001. Entailment with conditional equality constraints. In Proceedings of the European Symposium on Programming (ESOP). Lecture Notes in Computer Science, vol. 2028. Springer-Verlag, 170-189. URL: http://www.cs.ucdavis.edu/~su/publications/esop01.pdf.
    • (2001) Proceedings of the European Symposium on Programming (ESOP) , vol.2028 , pp. 170-189
    • Su, Z.1    Aiken, A.2
  • 38
    • 0005253318 scopus 로고    scopus 로고
    • Hindley/Milner style type systems in constraint form
    • University of South Australia, School of Computer and Information Science. July
    • SULZMANN, M., MÜLLER, M., AND ZENGER, C. 1999. Hindley/Milner style type systems in constraint form. Research Report ACRC-99-009, University of South Australia, School of Computer and Information Science. July. URL: http://www.ps.uni-sb.de/~mmueller/papers/hm-constraints.ps.gz.
    • (1999) Research Report , vol.ACRC-99-009
    • Sulzmann, M.1    Müller, M.2    Zenger, C.3
  • 39
    • 4344630108 scopus 로고    scopus 로고
    • Enforcing security properties using type specialization
    • Lecture Notes in Computer Science. Springer-Verlag, New York
    • THIEMANN, P. 2001. Enforcing security properties using type specialization. In Proceedings of the European Symposium on Programming (ESOP). Lecture Notes in Computer Science. Springer-Verlag, New York, URL: http://www.informatik.uni-freiburg.de/~thiemann/papers/espps-het.ps.gz.
    • (2001) Proceedings of the European Symposium on Programming (ESOP)
    • Thiemann, P.1
  • 40
    • 3042814322 scopus 로고    scopus 로고
    • The marriage of effects and monads
    • WADLER, P. AND THIEMANN, P. 2003. The marriage of effects and monads. ACM Trans. Comput. Logic 4, 1 (Jan.), 1-32. URL: http://www.research.avayalabs.com/ user/wadler/papers/effectstocl/effectstocl.ps.gz.
    • (2003) ACM Trans. Comput. Logic , vol.4 , Issue.1 JAN , pp. 1-32
    • Wadler, P.1    Thiemann, P.2
  • 43
    • 0003396725 scopus 로고    scopus 로고
    • Ph.D. dissertation, Princeton University
    • WALLACH, D. S. 1999. A new approach to mobile code security. Ph.D. dissertation, Princeton University. URL: http://www.cs.princeton.edu/sip/pub/ dwallach-dissertation.html.
    • (1999) A New Approach to Mobile Code Security
    • Wallach, D.S.1
  • 44
    • 0039334688 scopus 로고    scopus 로고
    • SAFKASI: A security mechanism for language-based systems
    • WALLACH, D. S., APPEL, A. W., AND FELTEN, E. W. 2000. SAFKASI: A security mechanism for language-based systems. ACM Trans. Softw. Eng. Method. 9, 4 (Oct.), 341-378. URL: http://www.cs.rice.edu/~dwallach/pub/tosem2000.ps.
    • (2000) ACM Trans. Softw. Eng. Method. , vol.9 , Issue.4 OCT , pp. 341-378
    • Wallach, D.S.1    Appel, A.W.2    Felten, E.W.3
  • 45
    • 0030777956 scopus 로고    scopus 로고
    • A practical soft type system for Scheme
    • WRIGHT, A. K. AND CARTWRIGHT, R. 1997. A practical soft type system for Scheme. ACM Trans. Prog. Lang. Syst. 19, 1 (Jan.), 87-152. URL: http://doi.acm.org/10.1145/239912.239917.
    • (1997) ACM Trans. Prog. Lang. Syst. , vol.19 , Issue.1 JAN , pp. 87-152
    • Wright, A.K.1    Cartwright, R.2
  • 46
    • 0003025818 scopus 로고
    • A syntactic approach to type soundness
    • WRIGHT, A. K. AND FELLEISEN, M. 1994. A syntactic approach to type soundness. Inf. Comput. 115, 1 (Nov.), 38-94. URL: http://www.cs.rice.edu/CS/ PLT/Publications/Scheme/ic94-wf.ps.gz.
    • (1994) Inf. Comput. , vol.115 , Issue.1 NOV , pp. 38-94
    • Wright, A.K.1    Felleisen, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.