-
2
-
-
0037190144
-
Maude: Specification and programming in rewriting logic
-
Manuel Clavel, Francisco Durán, Steven Eker, Patrick Lincoln, Narciso Martí-Oliet, at al. Maude: specification and programming in rewriting logic. Theoretical Computer Science, 285(2): 2002.
-
(2002)
Theoretical Computer Science
, vol.285
, Issue.2
-
-
Clavel, M.1
Durán, F.2
Eker, S.3
Lincoln, P.4
Martí-Oliet, N.5
at al6
-
4
-
-
33751067472
-
-
Richard S. Cox, Jacob G. Hansen, Steven D. Gribble, and Henry M. Levy: A Safety-Oriented Platform for Web Applications, IEEE Symposium on Security and Privacy, 2006
-
Richard S. Cox, Jacob G. Hansen, Steven D. Gribble, and Henry M. Levy: "A Safety-Oriented Platform for Web Applications," IEEE Symposium on Security and Privacy, 2006
-
-
-
-
7
-
-
0026281520
-
A prototype B3 trusted X Window System
-
Jeremy Epstein, John McHugh, Rita Pascale, Hilarie Orman, Glenn Benson, et al, "A prototype B3 trusted X Window System," Computer Security Applications Conference, 1991.
-
(1991)
Computer Security Applications Conference
-
-
Epstein, J.1
McHugh, J.2
Pascale, R.3
Orman, H.4
Benson, G.5
-
12
-
-
0027113376
-
Conditional Rewriting Logic as a United Model of Concurrency
-
José Meseguer. "Conditional Rewriting Logic as a United Model of Concurrency". Theoretical Computer Science, 96(1): 73-155, 1992.
-
(1992)
Theoretical Computer Science
, vol.96
, Issue.1
, pp. 73-155
-
-
Meseguer, J.1
-
13
-
-
84923564816
-
Finding Security Vulnerabilities in Java Applications with Static Analysis
-
Benjamin Livshits, Monica S. Lam. "Finding Security Vulnerabilities in Java Applications with Static Analysis," USENIX Security Symposium, 2005.
-
(2005)
USENIX Security Symposium
-
-
Livshits, B.1
Lam, M.S.2
-
15
-
-
84955602379
-
Formal Verification of Cryptographic Protocols: A Survey
-
Springer
-
Catherine Meadows. Formal Verification of Cryptographic Protocols: A Survey. Lecture Notes in Computer Science, 917, 135-150, 1995, Springer.
-
(1995)
Lecture Notes in Computer Science
, vol.917
, pp. 135-150
-
-
Meadows, C.1
-
16
-
-
34548797457
-
-
The MSDN Library. Changing Element Styles. http://msdn.microsoft.com/
-
The MSDN Library. "Changing Element Styles". http://msdn.microsoft.com/
-
-
-
-
17
-
-
34548742655
-
-
The MSDN Library. OLE Background, http://msdn.microsoft.com/ library/default.asp?url=/library/en-us/vccore/html/_core_ole_background. asp
-
The MSDN Library. "OLE Background," http://msdn.microsoft.com/ library/default.asp?url=/library/en-us/vccore/html/_core_ole_background.asp
-
-
-
-
18
-
-
85076780225
-
BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML
-
Charles Reis, John Dunagan, Helen J. Wang, Opher Dubrovsky, and Saher Esmeir. "BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML". Operating Systems Design and Implementation, 2006.
-
(2006)
Operating Systems Design and Implementation
-
-
Reis, C.1
Dunagan, J.2
Wang, H.J.3
Dubrovsky, O.4
Esmeir, S.5
-
20
-
-
34548747837
-
-
SpoofStick. http://www.spoofstick.com/
-
SpoofStick
-
-
-
21
-
-
34548747262
-
-
Firefox Visual Spoofing Flaws. Bugtraq list, http://securityfocus.com/ bid. Bug IDs: 10532, 10832, 12153, 12234, 12798, 14526, 14919
-
Firefox Visual Spoofing Flaws. Bugtraq list, http://securityfocus.com/ bid. Bug IDs: 10532, 10832, 12153, 12234, 12798, 14526, 14919
-
-
-
-
22
-
-
34548739360
-
-
Internet Explorer Visual Spoofing Flaws. Bugtraq list, http://securityfocus.com/bid. Bug IDs: 3469, 10023, 10943, 11561, 11590, 11851, 11855, 1254.
-
Internet Explorer Visual Spoofing Flaws. Bugtraq list, http://securityfocus.com/bid. Bug IDs: 3469, 10023, 10943, 11561, 11590, 11851, 11855, 1254.
-
-
-
-
23
-
-
34548753198
-
-
Netscape Navigator Visual Spoofing Flaws. Bugtraq list, http://securityfocus.com/bid. Bug IDs: 7564, 10389
-
Netscape Navigator Visual Spoofing Flaws. Bugtraq list, http://securityfocus.com/bid. Bug IDs: 7564, 10389
-
-
-
-
25
-
-
85084161317
-
-
E. Ye, S.W. Smith. Trusted Paths for Browsers. 11th Usenix Security Symposium. August 2002. (Also, E. Ye, Y.Yuan, S. W. Smith. Web Spoofing Revisited: SSL and Beyond, Technical Report TR2002-417, Dartmouth College. February 2002.)
-
E. Ye, S.W. Smith. "Trusted Paths for Browsers." 11th Usenix Security Symposium. August 2002. (Also, E. Ye, Y.Yuan, S. W. Smith. "Web Spoofing Revisited: SSL and Beyond," Technical Report TR2002-417, Dartmouth College. February 2002.)
-
-
-
|