-
1
-
-
34247339204
-
-
Analysis and Specialization for the C Programming Language. PhD thesis, University of Copenhagen, Copenhagen, Denmark, May
-
Lars Ole Andersen. Program Analysis and Specialization for the C Programming Language. PhD thesis, University of Copenhagen, Copenhagen, Denmark, May 1994.
-
(1994)
Program
-
-
Ole Andersen, L.1
-
2
-
-
34247361097
-
-
Achim D. Brucker and Burkhart Wolff. Testing Distributed Component Based Systems Using UML/OCL. In K. Bauknecht, W. Brauer, and Th. Muck, editors, Proceedings of Informatik 2001, 1 of Tagungsband der GI/ÖCG Jahrestagung, pages 608-614, Vienna, Austria, November 2001. Österreichische Computer Gesellschaft.
-
Achim D. Brucker and Burkhart Wolff. Testing Distributed Component Based Systems Using UML/OCL. In K. Bauknecht, W. Brauer, and Th. Muck, editors, Proceedings of Informatik 2001, volume 1 of Tagungsband der GI/ÖCG Jahrestagung, pages 608-614, Vienna, Austria, November 2001. Österreichische Computer Gesellschaft.
-
-
-
-
3
-
-
1442313098
-
Saving the World from Bad Beans: Deployment-Time Confinement Checking
-
Anaheim, CA, USA, ACM Press
-
Dave Clarke, Michael Richmond, and James Noble. Saving the World from Bad Beans: Deployment-Time Confinement Checking. In Proceedings of the 18th annual ACM SIGPLAN Conference on Object-Oriented Programing. Systems, Languages, and Applications, pages 374-387, Anaheim, CA, USA, 2003. ACM Press.
-
(2003)
Proceedings of the 18th annual ACM SIGPLAN Conference on Object-Oriented Programing. Systems, Languages, and Applications
, pp. 374-387
-
-
Clarke, D.1
Richmond, M.2
Noble, J.3
-
5
-
-
0026243790
-
Efficiently Computing Static Single Assignment Form and the Control Dependence Graph
-
October
-
Ron Cytron, Jeanne Ferrante, Barry K. Rosen, Mark N. Wegman, and F. Kenneth Zadeck. Efficiently Computing Static Single Assignment Form and the Control Dependence Graph. Transactions on Programming Languages and Systems (TOPLAS), 13(4):451-490, October 1991.
-
(1991)
Transactions on Programming Languages and Systems (TOPLAS)
, vol.13
, Issue.4
, pp. 451-490
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B.K.3
Wegman, M.N.4
Kenneth Zadeck, F.5
-
6
-
-
85001697848
-
A Fine-grained Access Control System for XML Documents
-
Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, and Pierangela Samarati. A Fine-grained Access Control System for XML Documents. ACM Transactions on Information Systems Security, 5(2): 169-202, 2002.
-
(2002)
ACM Transactions on Information Systems Security
, vol.5
, Issue.2
, pp. 169-202
-
-
Damiani, E.1
Capitani di Vimercati, S.D.2
Paraboschi, S.3
Samarati, P.4
-
7
-
-
1642362072
-
-
Prentice Hall, Upper Saddle River, NJ, USA, September
-
Harvey M. Deitel, Paul J. Deitel, and Sean E. Santry. Advanced Java 2 Platform: How to Program. Prentice Hall, Upper Saddle River, NJ, USA, September 2001.
-
(2001)
Advanced Java 2 Platform: How to Program
-
-
Deitel, H.M.1
Deitel, P.J.2
Santry, S.E.3
-
8
-
-
0002357382
-
Role-Based Access Controls
-
Baltimore, MD, USA, October
-
David F. Ferraiolo and D. Richard Kuhn. Role-Based Access Controls. In Proceedings of the 15th NIST-NCSC National Computer Security Conference, pages 554-563, Baltimore, MD, USA, October 1992.
-
(1992)
Proceedings of the 15th NIST-NCSC National Computer Security Conference
, pp. 554-563
-
-
Ferraiolo, D.F.1
Richard Kuhn, D.2
-
9
-
-
34247358553
-
-
Stephen J. Fink, Julian Dolby, and Logan Colby. Semi-Automatic J2EE Transaction Configuration. Technical Report RC23326, IBM Corporation, Thomas J. Watson Research Center, Yorktown Heights, NY, USA, 2004.
-
Stephen J. Fink, Julian Dolby, and Logan Colby. Semi-Automatic J2EE Transaction Configuration. Technical Report RC23326, IBM Corporation, Thomas J. Watson Research Center, Yorktown Heights, NY, USA, 2004.
-
-
-
-
10
-
-
21644484975
-
-
O'Reilly & Associates, Inc, Sebastopol, CA, USA, June
-
Adam Freeman and Allen Jones. Programming .NET Security. O'Reilly & Associates, Inc., Sebastopol, CA, USA, June 2003.
-
(2003)
Programming .NET Security
-
-
Freeman, A.1
Jones, A.2
-
11
-
-
0034246578
-
Location Consistency-A New Memory Model and Cache Consistency Protocol
-
Guang R. Gao and Vivek Sarkar. Location Consistency-A New Memory Model and Cache Consistency Protocol. IEEE Transactions on Computers, 49(8):798-813, 2000.
-
(2000)
IEEE Transactions on Computers
, vol.49
, Issue.8
, pp. 798-813
-
-
Gao, G.R.1
Sarkar, V.2
-
12
-
-
0003801299
-
-
Addison-Wesley, Reading, MA, USA, second edition, May
-
Li Gong, Gary Ellison, and Mary Dageforde. Inside Java 2 Platform Security: Architecture, API Design, and Implementation. Addison-Wesley, Reading, MA, USA, second edition, May 2003.
-
(2003)
Inside Java 2 Platform Security: Architecture, API Design, and Implementation
-
-
Gong, L.1
Ellison, G.2
Dageforde, M.3
-
13
-
-
0004277741
-
-
Birkhäuser, Boston, MA, USA, second edition, January
-
George Grätzer. General Lattice Theory. Birkhäuser, Boston, MA, USA, second edition, January 2003.
-
(2003)
General Lattice Theory
-
-
Grätzer, G.1
-
14
-
-
0011792814
-
A Framework for Call Graph Construction Algorithms
-
November
-
David Grove and Craig Chambers. A Framework for Call Graph Construction Algorithms. ACM Trans. Program. Lang. Syst., 23(6):685-746, November 2001.
-
(2001)
ACM Trans. Program. Lang. Syst
, vol.23
, Issue.6
, pp. 685-746
-
-
Grove, D.1
Chambers, C.2
-
15
-
-
0037587555
-
Cadena: An Integrated Development, Analysis, and Verification Environment for Component-based Systems
-
Portland, OR, USA, May
-
John Hatcliff, Xinghua Deng, Matthew B. Dwyer, Georg Jung, and Venkatesh Prasad Ranganath. Cadena: An Integrated Development, Analysis, and Verification Environment for Component-based Systems. In Proceedings of the 25th International Conference on Software Engineering, pages 160-173, Portland, OR, USA, May 2003.
-
(2003)
Proceedings of the 25th International Conference on Software Engineering
, pp. 160-173
-
-
Hatcliff, J.1
Deng, X.2
Dwyer, M.B.3
Jung, G.4
Prasad Ranganath, V.5
-
16
-
-
34247370090
-
-
IBM Corporation
-
IBM Corporation, Trade3 Benchmark, http://www.ibm.com/software/.
-
Trade3 Benchmark
-
-
-
17
-
-
0038507387
-
Alloy: A Lightweight Object Modelling Notation
-
Daniel Jackson. Alloy: A Lightweight Object Modelling Notation. ACM Trans. Softw. Eng. Methodol., 11(2):256-290, 2002.
-
(2002)
ACM Trans. Softw. Eng. Methodol
, vol.11
, Issue.2
, pp. 256-290
-
-
Jackson, D.1
-
18
-
-
0033698475
-
Alcoa: The Alloy Constraint Analyzer
-
Limerick, Ireland, ACM Press
-
Daniel Jackson, Ian Schlechter, and Hya Shlyahter. Alcoa: The Alloy Constraint Analyzer. In Proceedings of the 22nd International Conference on Software Engineering, pages 730-733, Limerick, Ireland, 2000. ACM Press.
-
(2000)
Proceedings of the 22nd International Conference on Software Engineering
, pp. 730-733
-
-
Jackson, D.1
Schlechter, I.2
Shlyahter, H.3
-
19
-
-
0015742560
-
-
Gary A. Kildall. A Unified Approach to Global Program Optimization. In Proceedings of the 1st Annual, ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages, pages 194-206, Boston, MA, USA, 1973. ACM Press.
-
Gary A. Kildall. A Unified Approach to Global Program Optimization. In Proceedings of the 1st Annual, ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages, pages 194-206, Boston, MA, USA, 1973. ACM Press.
-
-
-
-
20
-
-
0038108908
-
Access Rights Analysis for Java
-
Seattle, WA, USA, November, ACM Press
-
Larry Koved, Marco Pistoia, and Aaron Kershenbaum. Access Rights Analysis for Java. In Proceedings of the 17th ACM SIGPLAN Conference, on Object-Oriented Programming. Systems, Languages, and Applications, pages 359-372, Seattle, WA, USA, November 2002. ACM Press.
-
(2002)
Proceedings of the 17th ACM SIGPLAN Conference, on Object-Oriented Programming. Systems, Languages, and Applications
, pp. 359-372
-
-
Koved, L.1
Pistoia, M.2
Kershenbaum, A.3
-
21
-
-
0034450091
-
XML Document Security Based on Provisional Authorization
-
Athens, Greece, November, ACM Press
-
Michiharu Kudo and Satoshi Hada. XML Document Security Based on Provisional Authorization. In Proceedings of the 7th ACM Conference on Computer and Communications Security, pages 87-96, Athens, Greece, November 2000. ACM Press.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security
, pp. 87-96
-
-
Kudo, M.1
Hada, S.2
-
22
-
-
33646718786
-
Reflection Analysis for Java
-
Tsakuba, Japan, November
-
Benjamin Livshits, John Whaley, and Monica S. Lam. Reflection Analysis for Java. In Proceedings of the 3rd Asian Symposium on Programming Languages and Systems, pages 139-160, Tsakuba, Japan, November 2005.
-
(2005)
Proceedings of the 3rd Asian Symposium on Programming Languages and Systems
, pp. 139-160
-
-
Livshits, B.1
Whaley, J.2
Lam, M.S.3
-
24
-
-
4544248702
-
XML Access Control Using Static Analysis
-
Washington, DC, USA, October, ACM Press
-
Makoto Murata, Akihiko Tozawa, Michiharu Kudo, and Satoshi Hada. XML Access Control Using Static Analysis. In Proceedings of the 10th ACM Conference on Computer and Communications Security, pages 73-84, Washington, DC, USA, October 2003. ACM Press.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 73-84
-
-
Murata, M.1
Tozawa, A.2
Kudo, M.3
Hada, S.4
-
25
-
-
0031543270
-
A Decentralized Model for Information Flow Control
-
Saint Malo, France, October, ACM Press
-
Andrew C. Myers and Barbara Liskov. A Decentralized Model for Information Flow Control. In Proceedings of the 16th ACM Symposium on Operating Systems Principles, pages 129-142, Saint Malo, France, October 1997. ACM Press.
-
(1997)
Proceedings of the 16th ACM Symposium on Operating Systems Principles
, pp. 129-142
-
-
Myers, A.C.1
Liskov, B.2
-
26
-
-
26444597311
-
Static Analysis of Role-Based Access Control in J2EE Applications
-
September
-
Gleb Naumovich and Paolina, Centonze. Static Analysis of Role-Based Access Control in J2EE Applications. SIGSOFT Software Engineering Notes, 29(5): 1-10, September 2004.
-
(2004)
SIGSOFT Software Engineering Notes
, vol.29
, Issue.5
, pp. 1-10
-
-
Naumovich, G.1
Paolina, C.2
-
28
-
-
34247402439
-
Enterprise JavaBeans Development Using VisualAge for Java. IBM Redbooks
-
San Jose, CA, USA, June
-
Joaquin Picon, Patrizia Genchi, Maneesh Sahu, Martin Weiss, and Alain Dessureault. Enterprise JavaBeans Development Using VisualAge for Java. IBM Redbooks. IBM Corporation, International Technical Support Organization, San Jose, CA, USA, June 1999.
-
(1999)
IBM Corporation, International Technical Support Organization
-
-
Picon, J.1
Genchi, P.2
Sahu, M.3
Weiss, M.4
Dessureault, A.5
-
29
-
-
34247380593
-
-
Marco Pistoia, and Robert J. Flynn. Interprocedural Analysis for Automatic Evaluation of Role-Based Access Control Policies. Technical Report RC23846 (W0511-020), IBM Corporation, Thomas J. Watson Research Center, Yorktown Heights, NY, USA, November 2005.
-
Marco Pistoia, and Robert J. Flynn. Interprocedural Analysis for Automatic Evaluation of Role-Based Access Control Policies. Technical Report RC23846 (W0511-020), IBM Corporation, Thomas J. Watson Research Center, Yorktown Heights, NY, USA, November 2005.
-
-
-
-
30
-
-
34247389562
-
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
-
Glasgow, Scotland, UK, July, Springer-Verlag
-
Marco Pistoia, Robert J. Flynn, Larry Koved, and Vugranam C. Sreedhar. Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection. In Proceedings of the 9th European Conference on Object-Oriented Programming, Glasgow, Scotland, UK, July 2005. Springer-Verlag.
-
(2005)
Proceedings of the 9th European Conference on Object-Oriented Programming
-
-
Pistoia, M.1
Flynn, R.J.2
Koved, L.3
Sreedhar, V.C.4
-
31
-
-
26444562678
-
-
Addison-Wesley, Reading, MA, USA, February
-
Marco Pistoia, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin. Enterprise Java Security. Addison-Wesley, Reading, MA, USA, February 2004.
-
(2004)
Enterprise Java Security
-
-
Pistoia, M.1
Nagaratnam, N.2
Koved, L.3
Nadalin, A.4
-
32
-
-
0004286931
-
-
Prentice Hall PTR, Upper Saddle River, NJ, USA, second edition, August
-
Marco Pistoia, Duane Reller, Deepak Gupta, Milind Nagnur, and Ashok K. Ramani. Java 2 Network Security. Prentice Hall PTR, Upper Saddle River, NJ, USA, second edition, August 1999.
-
(1999)
Java 2 Network Security
-
-
Pistoia, M.1
Reller, D.2
Gupta, D.3
Nagnur, M.4
Ramani, A.K.5
-
33
-
-
0035009417
-
Analysis and Testing of Web Applications
-
Toronto, ON, Canada, IEEE Computer Society
-
Filippo Ricca, and Paolo Tonella. Analysis and Testing of Web Applications. In Proceedings of the 28rd International Conference on Software Engineering, pages 25-34, Toronto, ON, Canada, 2001. IEEE Computer Society.
-
(2001)
Proceedings of the 28rd International Conference on Software Engineering
, pp. 25-34
-
-
Ricca, F.1
Tonella, P.2
-
34
-
-
77954500284
-
Dwyer, and John Hatcliff. Bogor: An Extensible and Highly-modular Software Model Checking Framework
-
New York, NY, USA, ACM Press
-
Robby, Matthew B. Dwyer, and John Hatcliff. Bogor: An Extensible and Highly-modular Software Model Checking Framework. In ESEC/FSE-11: Proceedings of the 9th European Software Engineering Conference held jointly with 11th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pages 267-276, New York, NY, USA, 2003. ACM Press.
-
(2003)
ESEC/FSE-11: Proceedings of the 9th European Software Engineering Conference held jointly with 11th ACM SIGSOFT International Symposium on Foundations of Software Engineering
, pp. 267-276
-
-
Robby1
Matthew, B.2
-
35
-
-
0016555241
-
The Protection of Information in Computer Systems
-
September
-
Jerome H. Saltzer and Michael D. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE, volume 63, pages 1278-1308, September 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
36
-
-
0030086382
-
Role-based access control models
-
February
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
37
-
-
0242625217
-
A Lightweight Approach to Specification and Analysis of Role-Based Access Control Extensions
-
Monterey, CA, USA, ACM Press
-
Andreas Schaad and Jonathan D. Moffett. A Lightweight Approach to Specification and Analysis of Role-Based Access Control Extensions. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, pages 13-22, Monterey, CA, USA, 2002. ACM Press.
-
(2002)
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies
, pp. 13-22
-
-
Schaad, A.1
Moffett, J.D.2
-
42
-
-
34247343731
-
The Case for Analysis Preserving Language Transformation
-
ACM Press, July
-
Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Weber, Trent Jaeger, Guillaume Marceau, and Liangzhao Zeng. The Case for Analysis Preserving Language Transformation. In Proceedings of the ACM SIGSOFT 2006 International Symposium on Software Testing and Analysis (ISSTA). ACM Press, July 2006.
-
(2006)
Proceedings of the ACM SIGSOFT 2006 International Symposium on Software Testing and Analysis (ISSTA)
-
-
Zhang, X.1
Koved, L.2
Pistoia, M.3
Weber, S.4
Jaeger, T.5
Marceau, G.6
Zeng, L.7
|