-
1
-
-
85081451591
-
-
http://www.cs.wise.edu/~vg/papers/icse2007.
-
-
-
-
3
-
-
0038716505
-
Debugging temporal specifications with concept analysis
-
G. Ammons, D. Mandelin, R. Bodik, and J. R. Larus. Debugging temporal specifications with concept analysis. In PLDI, 2003.
-
(2003)
PLDI
-
-
Ammons, G.1
Mandelin, D.2
Bodik, R.3
Larus, J.R.4
-
4
-
-
0004200684
-
-
Technical Report ESD-TR-73-51, Deputy for Command & Mgmt. Systems, Bedford, MA
-
J. P. Anderson. Computer security technology planning study, volume II. Technical Report ESD-TR-73-51, Deputy for Command & Mgmt. Systems, Bedford, MA, 1972.
-
(1972)
Computer security technology planning study, volume II
-
-
Anderson, J.P.1
-
5
-
-
85081447387
-
-
Aspect-oriented software development glossary
-
Aspect-oriented software development glossary. http://aosd.net/wiki/ index.php?title=Glossary.
-
-
-
-
6
-
-
31844457357
-
-
L. Bauer, J. Ligatti, and D. Walker. Composing security policies with Polymer. In PLDI, 2005.
-
L. Bauer, J. Ligatti, and D. Walker. Composing security policies with Polymer. In PLDI, 2005.
-
-
-
-
7
-
-
0025443276
-
Compartmented mode workstation: Prototype highlights
-
J. Berger, J. Picciotto, J. Woodward, and P. Cummings. Compartmented mode workstation: Prototype highlights. IEEE TSE, 16(6), 1990.
-
(1990)
IEEE TSE
, vol.16
, Issue.6
-
-
Berger, J.1
Picciotto, J.2
Woodward, J.3
Cummings, P.4
-
8
-
-
27744541616
-
A quantitative comparison of three aspect mining techniques
-
M. Ceccato, M. Marin, K. Mens, L. Moonen, P. Tonella, and T. Tourwe. A quantitative comparison of three aspect mining techniques. In 13th Wkshp. Prog. Comprehension, 2005.
-
(2005)
13th Wkshp. Prog. Comprehension
-
-
Ceccato, M.1
Marin, M.2
Mens, K.3
Moonen, L.4
Tonella, P.5
Tourwe, T.6
-
10
-
-
84974757646
-
A high assurance window system prototype
-
J. Epstein, J. McHugh, H. Orman, R. Pascale, A.-M. Squires, B. Danner, C. Martin, M. Branstad, G. Benson, and D. Rothnie. A high assurance window system prototype. Jour. Computer Security, 2(2-3), 1993.
-
(1993)
Jour. Computer Security
, vol.2
, Issue.2-3
-
-
Epstein, J.1
McHugh, J.2
Orman, H.3
Pascale, R.4
Squires, A.-M.5
Danner, B.6
Martin, C.7
Branstad, M.8
Benson, G.9
Rothnie, D.10
-
13
-
-
85081443504
-
Case study: Open source and commercial applications in a Java-based SELinux cross-domain solution
-
B. Fletcher. Case study: Open source and commercial applications in a Java-based SELinux cross-domain solution. In 2nd Security-enhanced Linux Symp., 2006.
-
(2006)
2nd Security-enhanced Linux Symp
-
-
Fletcher, B.1
-
14
-
-
33745766475
-
Automatic placement of authorization hooks in the Linux security modules framework. In ACM
-
V. Ganapathy, T. Jaeger, and S. Jha. Automatic placement of authorization hooks in the Linux security modules framework. In ACM Conf. Comp. Sr Comm. Security, 2005.
-
(2005)
Conf. Comp. Sr Comm. Security
-
-
Ganapathy, V.1
Jaeger, T.2
Jha, S.3
-
16
-
-
0029306863
-
Incremental concept formation algorithms based on Galois (concept) lattices
-
R. Godin, R. Missaoui, and H. Alaoui. Incremental concept formation algorithms based on Galois (concept) lattices. Computational Intelligence, 11(2), 1995.
-
(1995)
Computational Intelligence
, vol.11
, Issue.2
-
-
Godin, R.1
Missaoui, R.2
Alaoui, H.3
-
18
-
-
3142518085
-
Consistency analysis of authorization hook placement in the Linux security modules framework
-
T. Jaeger, A. Edwards, and X. Zhang. Consistency analysis of authorization hook placement in the Linux security modules framework. ACM TISSEC, 7(2), 2004.
-
(2004)
ACM TISSEC
, vol.7
, Issue.2
-
-
Jaeger, T.1
Edwards, A.2
Zhang, X.3
-
19
-
-
0000498999
-
Aspect-oriented programming
-
G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. Lopes, J.-M. Loingtier, and J. Irwin. Aspect-oriented programming. In ECOOP, 1997.
-
(1997)
ECOOP
-
-
Kiczales, G.1
Lamping, J.2
Mendhekar, A.3
Maeda, C.4
Lopes, C.5
Loingtier, J.-M.6
Irwin, J.7
-
20
-
-
24744432328
-
Securing the X Window system with SELinux
-
Technical Report 03-006, NAI Labs
-
D. Kilpatrick, W. Salamon, and C. Vance. Securing the X Window system with SELinux. Technical Report 03-006, NAI Labs, 2003.
-
(2003)
-
-
Kilpatrick, D.1
Salamon, W.2
Vance, C.3
-
21
-
-
0030615516
-
Assesing modular structure of legacy code based on mathematical concept analysis
-
C. Lindig and G. Snelting. Assesing modular structure of legacy code based on mathematical concept analysis. In ICSE, 1997.
-
(1997)
ICSE
-
-
Lindig, C.1
Snelting, G.2
-
22
-
-
2442425355
-
Integrating flexible support for security policies into the Linux operating system
-
P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In USENIX Annual Technical Conf. (FREENIX), 2001.
-
(2001)
USENIX Annual Technical Conf. (FREENIX)
-
-
Loscocco, P.1
Smalley, S.2
-
25
-
-
0032218209
-
-
G. Snelting and F. Tip. Reengineering class hierarchies using concept analysis. In ACM SIGSOFT FSE, 1998.
-
G. Snelting and F. Tip. Reengineering class hierarchies using concept analysis. In ACM SIGSOFT FSE, 1998.
-
-
-
-
26
-
-
18144367757
-
Aspect mining through the formal concept analysis of execution traces
-
P. Tonella and M. Ceccato. Aspect mining through the formal concept analysis of execution traces. In 11th Conf. on Reverse Engineering, 2004.
-
(2004)
11th Conf. on Reverse Engineering
-
-
Tonella, P.1
Ceccato, M.2
-
28
-
-
0032688675
-
Identifying objects using cluster and concept analysis
-
A. van Duersen and T. Kuipers. Identifying objects using cluster and concept analysis. In ICSE, 1999.
-
(1999)
ICSE
-
-
van Duersen, A.1
Kuipers, T.2
-
29
-
-
0000398336
-
Restructuring lattice theory: An approach based on hierarchies of concepts
-
R. Wille. Restructuring lattice theory: An approach based on hierarchies of concepts. Ordered Sets, 1982.
-
(1982)
Ordered Sets
-
-
Wille, R.1
-
30
-
-
85084164351
-
Linux security modules: General security support for the Linux kernel
-
C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-Hartman. Linux security modules: General security support for the Linux kernel. In USENIX Security Symp., 2002.
-
(2002)
USENIX Security Symp
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
Kroah-Hartman, G.5
-
31
-
-
85081451966
-
-
The X11 Server, version X11R6.8 (X.OrgFoundation).
-
The X11 Server, version X11R6.8 (X.OrgFoundation).
-
-
-
-
32
-
-
85084161756
-
Using CQUAL for static analysis of authorization hook placement
-
X. Zhang, A. Edwards, and T. Jaeger. Using CQUAL for static analysis of authorization hook placement. In USENIX Security Symp., 2002.
-
(2002)
USENIX Security Symp
-
-
Zhang, X.1
Edwards, A.2
Jaeger, T.3
|