-
2
-
-
24144435318
-
History-based access control and secure information flow
-
CASSIS04
-
A. Banerjee and D. A. Naumann, "History-based access control and secure information flow," CASSIS04, LNCS 3362, pp.27-48, 2004.
-
(2004)
LNCS
, vol.3362
, pp. 27-48
-
-
Banerjee, A.1
Naumann, D.A.2
-
3
-
-
24644498665
-
History-based access control with local policies
-
8th FOSSACS
-
M. Bartoletti, P. Degano, and G. L. Ferrari, "History-based access control with local policies," 8th FOSSACS, LNCS 3441, pp.316-332, 2005.
-
(2005)
LNCS
, vol.3441
, pp. 316-332
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.L.3
-
4
-
-
28144460333
-
Enforcing secure service composition
-
M. Bartoletti, P. Degano, and G. L. Ferrari, "Enforcing secure service composition," IEEE 18th CSFW, pp.211-223, 2005.
-
(2005)
IEEE 18th CSFW
, pp. 211-223
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.L.3
-
6
-
-
0000136802
-
Theory of ω-languages. I: Characterizations of ωcontext-free languages
-
R. S. Cohen and A. Y. Gold, "Theory of ω-languages. I: Characterizations of ωcontext-free languages," J. of Computer & System Science, 15, pp. 169-184, 1977.
-
(1977)
J. of Computer & System Science
, vol.15
, pp. 169-184
-
-
Cohen, R.S.1
Gold, A.Y.2
-
7
-
-
84976760215
-
Alternation
-
A. K. Chandra, D. C. Kozen, and L. J. Stockmeyer, "Alternation, " J. of the ACM, 28, pp.114-133, 1981.
-
(1981)
J. of the ACM
, vol.28
, pp. 114-133
-
-
Chandra, A.K.1
Kozen, D.C.2
Stockmeyer, L.J.3
-
9
-
-
0004116989
-
-
MIT Press
-
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to algorithms, MIT Press, 2003.
-
(2003)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
10
-
-
84944409009
-
Efficient algorithms for model-checking pushdown systems
-
CAV2000
-
J. Esparza, D. Hansel, P. Rossmanith, and S. Schwoon, "Efficient algorithms for model-checking pushdown systems," CAV2000, LNCS 1855, pp.232-247, 2000.
-
(2000)
LNCS
, vol.1855
, pp. 232-247
-
-
Esparza, J.1
Hansel, D.2
Rossmanith, P.3
Schwoon, S.4
-
12
-
-
84978974912
-
Model-checking LTL with regular variations for pushdown systems
-
TACS01
-
J. Esparza, A. Kučera, and S. Schwoon, "Model-checking LTL with regular variations for pushdown systems," TACS01, LNCS 2215, pp.316-339, 2001.
-
(2001)
LNCS
, vol.2215
, pp. 316-339
-
-
Esparza, J.1
Kučera, A.2
Schwoon, S.3
-
13
-
-
84958757867
-
A BDD-based model checker for recursive programs
-
CAV2001
-
J. Esparza and S. Schwoon, "A BDD-based model checker for recursive programs," CAV2001, LNCS 2102, pp.324-336, 2001.
-
(2001)
LNCS
, vol.2102
, pp. 324-336
-
-
Esparza, J.1
Schwoon, S.2
-
14
-
-
3543121920
-
Access control by tracking shallow execution history
-
P. W. Fong, "Access control by tracking shallow execution history," IEEE Security & Privacy, pp.43-55, 2004.
-
(2004)
IEEE Security & Privacy
, pp. 43-55
-
-
Fong, P.W.1
-
15
-
-
84887507059
-
Going beyond the sandbox: An overview of the new security architecture in the Java™ development kit 1.2
-
L. Gong, M. Mueller, H. Prafullchandra, and R. Schemers, "Going beyond the sandbox: An overview of the new security architecture in the Java™ development kit 1.2," USENIX Symp. on Internet Technologies and Systems, pp.103-112, 1997.
-
(1997)
USENIX Symp. on Internet Technologies and Systems
, pp. 103-112
-
-
Gong, L.1
Mueller, M.2
Prafullchandra, H.3
Schemers, R.4
-
16
-
-
33745956964
-
Certified in-lined reference monitoring on.NET
-
K. W. Hamlen, G. Morrisett, and F. B. Schneider, "Certified in-lined reference monitoring on .NET," Cornell University Computing and Information Science Technical Report, TR2005-2003, 2005.
-
(2005)
Cornell University Computing and Information Science Technical Report
, vol.TR2005-2003
-
-
Hamlen, K.W.1
Morrisett, G.2
Schneider, F.B.3
-
17
-
-
0003620778
-
-
Addison Wesley
-
J. E. Hopcroft, R. Motwani, and J. D. Ullman, Introduction to automata theory, languages, and computation, Addison Wesley, 2001.
-
(2001)
Introduction to Automata Theory, Languages, and Computation
-
-
Hopcroft, J.E.1
Motwani, R.2
Ullman, J.D.3
-
18
-
-
84940106252
-
Verification of control flow based security properties
-
T. Jensen, D. Le Métayer, and T. Thorn, "Verification of control flow based security properties," IEEE Security & Privacy, pp.89-103, 1999.
-
(1999)
IEEE Security & Privacy
, pp. 89-103
-
-
Jensen, T.1
Le Métayer, D.2
Thorn, T.3
-
19
-
-
26044443603
-
A specification language for distributed policy control
-
4th ICICS
-
S. Kuninobu, Y. Takata, D. Taguchi, M. Nakae, and H. Seki, "A specification language for distributed policy control," 4th ICICS, LNCS 2513, pp.386-398, 2002.
-
(2002)
LNCS
, vol.2513
, pp. 386-398
-
-
Kuninobu, S.1
Takata, Y.2
Taguchi, D.3
Nakae, M.4
Seki, H.5
-
20
-
-
0035751301
-
An efficient security verification method for programs with stack inspection
-
N. Nitta, Y. Takata, and H. Seki, "An efficient security verification method for programs with stack inspection," 8th ACM Computer & Communications Security, pp.68-77, 2001.
-
(2001)
8th ACM Computer & Communications Security
, pp. 68-77
-
-
Nitta, N.1
Takata, Y.2
Seki, H.3
-
21
-
-
0035790675
-
The role-based access control system of a European bank: A case study and discussion
-
A. Schaad, J. Moffett, and J. Jacob, "The role-based access control system of a European bank: a case study and discussion," 6th ACM Symp. on Access Control Models and Technologies, pp.3-9, 2001.
-
(2001)
6th ACM Symp. on Access Control Models and Technologies
, pp. 3-9
-
-
Schaad, A.1
Moffett, J.2
Jacob, J.3
-
23
-
-
84956989228
-
A type-based approach to program security
-
TAPSOFT'97
-
D. Volpano and G. Smith, "A type-based approach to program security," TAPSOFT'97, LNCS 1214, pp.607-621, 1997.
-
(1997)
LNCS
, vol.1214
, pp. 607-621
-
-
Volpano, D.1
Smith, G.2
|