-
4
-
-
35248842056
-
Types and effects for non-interfering program monitors
-
M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, editors, Software Security - Theories and Systems. Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers, Springer
-
L. Bauer, J. Ligatti, and D. Walker. Types and effects for non-interfering program monitors. In M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, editors, Software Security - Theories and Systems. Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers, volume 2609 of Lecture Notes in Computer Science. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2609
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
13
-
-
3543139162
-
Computability classes for enforcement mechanisms
-
Cornell University, Aug.
-
K. Hamlen, G. Morrisett, and F. Schneider. Computability classes for enforcement mechanisms. Technical Report TR2003-1908, Cornell University, Aug. 2003.
-
(2003)
Technical Report
, vol.TR2003-1908
-
-
Hamlen, K.1
Morrisett, G.2
Schneider, F.3
-
14
-
-
0031618223
-
A lightweight architecture for program execution monitoring
-
ACM Press
-
C. Jeffery, W. Zhou, K. Templer, and M. Brazell. A lightweight architecture for program execution monitoring. In PASTE '98: Proceedings of the 1998 ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering, pages 67-74. ACM Press, 1998.
-
(1998)
PASTE '98: Proceedings of the 1998 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering
, pp. 67-74
-
-
Jeffery, C.1
Zhou, W.2
Templer, K.3
Brazell, M.4
-
15
-
-
0000713886
-
Aspect-oriented programming
-
G. Kiczales, J. Irwin, J. Lamping, J.-M. Loingtier, C. V. Lopes, C. Maeda, and A. Mendhekar. Aspect-oriented programming. ACM Comput. Surv., 28(4es):154, 1996.
-
(1996)
ACM Comput. Surv.
, vol.28
, Issue.4 ES
, pp. 154
-
-
Kiczales, G.1
Irwin, J.2
Lamping, J.3
Loingtier, J.-M.4
Lopes, C.V.5
Maeda, C.6
Mendhekar, A.7
-
16
-
-
33646040896
-
Computational analysis of run-time monitoring - Fundamentals of Java-MaC
-
June
-
M. Kim, S. Kannan, I. Lee, O. Sokolsky, and M. Viswantathan. Computational analysis of run-time monitoring - fundamentals of Java-MaC. In Run-time Verification, June 2002.
-
(2002)
Run-time Verification
-
-
Kim, M.1
Kannan, S.2
Lee, I.3
Sokolsky, O.4
Viswantathan, M.5
-
17
-
-
60349112980
-
Formally specified monitoring of temporal properties
-
York, UK, June
-
M. Kim, M. Viswanathan, H. Ben-Abdallah, S. Kannan, I. Lee, and O. Sokolsky. Formally specified monitoring of temporal properties. In European Conference on Real-time Systems, York, UK, June 1999.
-
(1999)
European Conference on Real-time Systems
-
-
Kim, M.1
Viswanathan, M.2
Ben-Abdallah, H.3
Kannan, S.4
Lee, I.5
Sokolsky, O.6
-
18
-
-
0017472779
-
Proving the correctness of multiprocess programs
-
L. Lamport. Proving the correctness of multiprocess programs. IEEE Transactions of Software Engineering, 3(2):125-143, 1977.
-
(1977)
IEEE Transactions of Software Engineering
, vol.3
, Issue.2
, pp. 125-143
-
-
Lamport, L.1
-
19
-
-
33646064059
-
Edit automata: Enforcement mechanisms for run-time security policies
-
Princeton University, May
-
J. Ligatti, L. Bauer, and D. Walker. Edit automata: Enforcement mechanisms for run-time security policies. Technical Report TR-681-03, Princeton University, May 2003.
-
(2003)
Technical Report
, vol.TR-681-03
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
20
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
Feb.
-
J. Ligatti, L. Bauer, and D. Walker. Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security, 4(1-2):2-16, Feb. 2005.
-
(2005)
International Journal of Information Security
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
21
-
-
33646067678
-
Enforcing non-safety security policies with program monitors
-
Princeton University, Jan.
-
J. Ligatti, L. Bauer, and D. Walker. Enforcing non-safety security policies with program monitors. Technical Report TR-720-05, Princeton University, Jan. 2005.
-
(2005)
Technical Report
, vol.TR-720-05
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
26
-
-
0027836576
-
Efficient software-based fault isolation
-
Asheville, Dec.
-
R. Wahbe, S. Lucco, T. Anderson, and S. Graham. Efficient software-based fault isolation. In Proceedings of the 14th Symposium on Operating Systems Principles, pages 203-216, Asheville, Dec. 1993.
-
(1993)
Proceedings of the 14th Symposium on Operating Systems Principles
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.3
Graham, S.4
|