-
1
-
-
0006100649
-
Smashing the stack for fun and profit
-
AlephOne. Smashing the stack for fun and profit. Phrack 7 49 (November 1996)
-
(1996)
Phrack
, vol.7
, Issue.49
-
-
AlephOne1
-
3
-
-
33746738341
-
Design and usability in security systems - daily life as a context of use?
-
Clear T. Design and usability in security systems - daily life as a context of use?. ACM SIGCSE Bulletin 4 34 (December 2002)
-
(2002)
ACM SIGCSE Bulletin
, vol.4
, Issue.34
-
-
Clear, T.1
-
4
-
-
33746744561
-
-
Cook WR. A proposal for making Eiffel type-safe. In: Third European conference on object-oriented programming (ECOOP); July 1989.
-
-
-
-
8
-
-
33746730628
-
-
ECMA International. Standard ECMA-335: common language infrastructure. 2nd ed. ; December 2002.
-
-
-
-
9
-
-
33746761198
-
-
Erlingsson Úlfar. The inlined reference monitor approach to security policy enforcement. Ph.D. thesis, Cornell University Department of Computer Science (Technical Report 2003-1916); 2003.
-
-
-
-
14
-
-
33746748947
-
Java security bug (applets can load native methods)
-
Hopwood D. Java security bug (applets can load native methods). Risks Forum (March 1996)
-
(1996)
Risks Forum
-
-
Hopwood, D.1
-
16
-
-
0345241830
-
-
Addison-Wesley
-
LaMacchia B.A., Lange S., Lyons M., Martin R., and Price K.T. NET framework security (April 2002), Addison-Wesley
-
(2002)
NET framework security
-
-
LaMacchia, B.A.1
Lange, S.2
Lyons, M.3
Martin, R.4
Price, K.T.5
-
18
-
-
0000058182
-
Java bytecode verification: an overview
-
Springer Verlag p. 265-85
-
Leroy X. Java bytecode verification: an overview. Computer aided verification vol. 2101 (2001), Springer Verlag p. 265-85
-
(2001)
Computer aided verification
, vol.2101
-
-
Leroy, X.1
-
19
-
-
33746662450
-
-
Lewin Mark. Email communication; January 2004.
-
-
-
-
22
-
-
3042645113
-
-
Meier J.D., Mackman A., Dunner M., and Vasireddy S. Building secure ASP .NET applications: authentication, authorization, and secure communication.
-
Building secure ASP .NET applications: authentication, authorization, and secure communication
-
-
Meier, J.D.1
Mackman, A.2
Dunner, M.3
Vasireddy, S.4
-
30
-
-
0026972623
-
-
Pierce Benjamin C. Bounded quantification is undecidable. In: ACM SIGPLAN symposium on principles of programming languages (POPL); January 1992.
-
-
-
-
33
-
-
33746669518
-
-
Saltzer Jerome, Schroeder Michael. The protection of information in computer systems. In: Fourth ACM symposium on operating system principles; October 1973 [revised version in Communications of the ACM, July 1974].
-
-
-
-
36
-
-
33746773216
-
-
Sun Microsystems. JSR 202: Java Class File Specification Update, .
-
-
-
-
37
-
-
33746699131
-
-
Sun Microsystems. New Java SE Mustang Feature: Type Checking Verifier, .
-
-
-
-
50
-
-
33746702791
-
-
Walker David. A type system for expressive security policies. In: ACM SIGPLAN symposium on principles of programming languages (POPL); January 2000.
-
-
-
-
52
-
-
33746732428
-
-
Wallach Dan, Balfanz Dirk, Dean Drew, Felten Edward. Extensible security architectures for Java. In: Symposium on operating systems principles; October 1997.
-
-
-
-
53
-
-
33746772278
-
-
Yellin Frank. Low level security in Java. In: Fourth international WWW conference; December 1995.
-
-
-
|