-
1
-
-
33846616949
-
-
BANERJEE, A. AND NAUMANN, D. 2001. A simple semantics and static analysis for Java security. CS Rep. AI-068-85, Stevens Institute of Technology.
-
BANERJEE, A. AND NAUMANN, D. 2001. A simple semantics and static analysis for Java security. CS Rep. AI-068-85, Stevens Institute of Technology.
-
-
-
-
3
-
-
35048881016
-
Certified bytecode verification
-
Proceedings of the International Conference on Fundamental Approaches to Software Engineering, Springer Verlag, Berlin
-
BARTHE, G. AND DUFAY, G. 2004. Certified bytecode verification. In Proceedings of the International Conference on Fundamental Approaches to Software Engineering. Lecture Notes in Computer Science, vol. 2984. Springer Verlag, Berlin. 99-113.
-
(2004)
Lecture Notes in Computer Science
, vol.2984
, pp. 99-113
-
-
BARTHE, G.1
DUFAY, G.2
-
5
-
-
21144446851
-
A tail-recursive semantics for stack inspections
-
European Symposium on Programming, Springer Verlag, Berlin
-
CLEMENTS, J. AND FELLEISEN, M. 2003. A tail-recursive semantics for stack inspections. In European Symposium on Programming. Lecture Notes in Computer Science, vol. 2618. Springer Verlag, Berlin. 22-37.
-
(2003)
Lecture Notes in Computer Science
, vol.2618
, pp. 22-37
-
-
CLEMENTS, J.1
FELLEISEN, M.2
-
8
-
-
0000877763
-
The type system for object initialization in the Java bytecode language
-
FREUND, S. AND MITCHELL, J. 1999. The type system for object initialization in the Java bytecode language. ACM Trans. Program. Lang. Syst. 21, 6, 1196-1250.
-
(1999)
ACM Trans. Program. Lang. Syst
, vol.21
, Issue.6
, pp. 1196-1250
-
-
FREUND, S.1
MITCHELL, J.2
-
9
-
-
0042383146
-
A type system for the Java bytecode language and verifier
-
FREUND, S. AND MITCHELL, J. 2003. A type system for the Java bytecode language and verifier. J. Autom. Reasoning 30, 3-4, 271-321.
-
(2003)
J. Autom. Reasoning
, vol.30
-
-
FREUND, S.1
MITCHELL, J.2
-
10
-
-
0024960701
-
Complete sets of transformations for general E-Unification
-
GALLIER, J. AND SNYDER, W. 1989. Complete sets of transformations for general E-Unification. Theor. Comput. Sci. 67, 2, 203-260.
-
(1989)
Theor. Comput. Sci
, vol.67
, Issue.2
, pp. 203-260
-
-
GALLIER, J.1
SNYDER, W.2
-
16
-
-
0038108908
-
Access rights analysis for Java
-
KOVED, L., PISTOIA, M., AND KERSHENBAUM, A. 2002. Access rights analysis for Java. In Proceedings of the Conference on Object-Oriented Programming Systems, Languages and Applications. 359-372.
-
(2002)
Proceedings of the Conference on Object-Oriented Programming Systems, Languages and Applications
, pp. 359-372
-
-
KOVED, L.1
PISTOIA, M.2
KERSHENBAUM, A.3
-
18
-
-
0042733585
-
Java bytecode verification: Algorithms and formalizations
-
LEROY, X. 2003. Java bytecode verification: Algorithms and formalizations. J. Autom. Reasoning 30, 3-4, 235-269.
-
(2003)
J. Autom. Reasoning
, vol.30
-
-
LEROY, X.1
-
21
-
-
34250702840
-
Java bytecode verification, editorial introduction to the special issue
-
NIPKOW, T. 2003. Java bytecode verification, editorial introduction to the special issue. J. Autom. Reasoning 30, 3-4, 233-233.
-
(2003)
J. Autom. Reasoning
, vol.30
-
-
NIPKOW, T.1
-
22
-
-
84957631403
-
The logical abstract machine: A Curry-Howard isomorphism for machine code
-
Proceedings of International Symposium on Functional and Logic Programming, Springer Verlag, Berlin
-
OHORI, A. 1999. The logical abstract machine: A Curry-Howard isomorphism for machine code. In Proceedings of International Symposium on Functional and Logic Programming. Lecture Notes in Computer Science, vol. 1722. Springer Verlag, Berlin. 300-318.
-
(1999)
Lecture Notes in Computer Science
, vol.1722
, pp. 300-318
-
-
OHORI, A.1
-
23
-
-
84958764832
-
Byte code verification for Java smart card based on model checking
-
Proceedings of the European Symposium on Research in Computer Security, Springer Verlag, Berlin
-
POSEGGA, J. AND VOGT, H. 1998. Byte code verification for Java smart card based on model checking. In Proceedings of the European Symposium on Research in Computer Security. Lecture Notes in Computer Science, vol. 1485. Springer Verlag, Berlin. 175-190.
-
(1998)
Lecture Notes in Computer Science
, vol.1485
, pp. 175-190
-
-
POSEGGA, J.1
VOGT, H.2
-
24
-
-
27844549441
-
A systematic approach to static access control
-
PUTTIER, F., SKALKA, C., AND SMITH, S. 2005. A systematic approach to static access control. ACM Trans. Program. Lang. Syst. 27, 2, 344-382.
-
(2005)
ACM Trans. Program. Lang. Syst
, vol.27
, Issue.2
, pp. 344-382
-
-
PUTTIER, F.1
SKALKA, C.2
SMITH, S.3
-
26
-
-
35048838770
-
History effects and verification
-
Proceedings of the Asian Symposium on Programming Languages and Systems, Springer Verlag, Berlin
-
SKALKA, C. AND SMITH, S. 2004. History effects and verification. In Proceedings of the Asian Symposium on Programming Languages and Systems. Lecture Notes in Computer Science. Springer Verlag, Berlin. 107-128.
-
(2004)
Lecture Notes in Computer Science
, pp. 107-128
-
-
SKALKA, C.1
SMITH, S.2
-
30
-
-
0039334688
-
Safkasi: A security mechanism for language-based systems
-
WALLACH, D., APPEL, A., AND FELTEN, E. 2000. Safkasi: A security mechanism for language-based systems. ACM Trans. Softw. Eng. Methodol. 9, 341-378.
-
(2000)
ACM Trans. Softw. Eng. Methodol
, vol.9
, pp. 341-378
-
-
WALLACH, D.1
APPEL, A.2
FELTEN, E.3
|