-
1
-
-
33846012075
-
-
A. V. Aho, R. Sethi, and J. D. Ullman. Compilers:, Addison-Wesley, Reading, MA, USA, Jan
-
A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley, Reading, MA, USA, Jan. 1986.
-
(1986)
Principles, Techniques, and Tools
-
-
-
2
-
-
0030260329
-
Fast Static Analysis of C++ Virtual Function Calls
-
San Jose, CA, USA, ACM Press. Also published in ACM SIGPLAN Notices
-
D. F. Bacon and P. F. Sweeney. Fast Static Analysis of C++ Virtual Function Calls. In Proceedings of the 11th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, pages 324-341, San Jose, CA, USA, 1996. ACM Press. Also published in ACM SIGPLAN Notices 31(10).
-
(1996)
Proceedings of the 11th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications
, vol.31
, Issue.10
, pp. 324-341
-
-
Bacon, D.F.1
Sweeney, P.F.2
-
3
-
-
34247363687
-
Role-Based Access Control Consistency Validation
-
Portland, ME, USA, ACM Press
-
P. Centonze, G. Naumovich, S.J. Fink, and M. Pistoia. Role-Based Access Control Consistency Validation. In Proceedings of the 2006 International Symposium on Software Testing and Analysis (ISSTA 2006), pages 121-132, Portland, ME, USA, 2006. ACM Press.
-
(2006)
Proceedings of the 2006 International Symposium on Software Testing and Analysis (ISSTA 2006)
, pp. 121-132
-
-
Centonze, P.1
Naumovich, G.2
Fink, S.J.3
Pistoia, M.4
-
4
-
-
1442313098
-
Saving the World from Bad Beans: Deployment-Time Confinement Checking
-
Anaheim, CA, USA, ACM Press
-
D. Clarke, M. Richmond, and J. Noble. Saving the World from Bad Beans: Deployment-Time Confinement Checking. In Proceedings of the 18th annual ACM SIGPLAN Conference on Object-Oriented Programing, Systems, Languages, and Applications, pages 374-387, Anaheim, CA, USA, 2003. ACM Press.
-
(2003)
Proceedings of the 18th annual ACM SIGPLAN Conference on Object-Oriented Programing, Systems, Languages, and Applications
, pp. 374-387
-
-
Clarke, D.1
Richmond, M.2
Noble, J.3
-
5
-
-
85001697848
-
A Fine-grained Access Control System for XML Documents
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. A Fine-grained Access Control System for XML Documents. ACM Transactions on Information Systems Security, 5(2):169-202, 2002.
-
(2002)
ACM Transactions on Information Systems Security
, vol.5
, Issue.2
, pp. 169-202
-
-
Damiani, E.1
De Capitani di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
6
-
-
84948958710
-
Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis
-
Aarhus, Denmark, August, Springer-Verlag
-
J. Dean, D. Grove, and C. Chambers. Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis. In Proceedings of the 9th European Conference on Object-Oriented Programming, pages 77-101, Aarhus, Denmark, August 1995. Springer-Verlag.
-
(1995)
Proceedings of the 9th European Conference on Object-Oriented Programming
, pp. 77-101
-
-
Dean, J.1
Grove, D.2
Chambers, C.3
-
7
-
-
1642362072
-
-
Prentice Hall, Upper Saddle River, NJ, USA, September
-
H. M. Deitel, P. J. Deitel, and S. E. Santry. Advanced Java 2 Platform: How to Program. Prentice Hall, Upper Saddle River, NJ, USA, September 2001.
-
(2001)
Advanced Java 2 Platform: How to Program
-
-
Deitel, H.M.1
Deitel, P.J.2
Santry, S.E.3
-
8
-
-
0002357382
-
Role-Based Access Controls
-
Baltimore, MD, USA, October
-
D. F. Ferraiolo and D. R. Kuhn. Role-Based Access Controls. In Proceedings of the 15th NIST-NCSC National Computer Security Conference, pages 554-563, Baltimore, MD, USA, October 1992.
-
(1992)
Proceedings of the 15th NIST-NCSC National Computer Security Conference
, pp. 554-563
-
-
Ferraiolo, D.F.1
Kuhn, D.R.2
-
9
-
-
21644484975
-
-
O'Reilly & Associates, Inc, Sebastopol, CA, USA, June
-
A. Freeman and A. Jones. Programming .NET Security. O'Reilly & Associates, Inc., Sebastopol, CA, USA, June 2003.
-
(2003)
Programming .NET Security
-
-
Freeman, A.1
Jones, A.2
-
10
-
-
0011792814
-
A Framework for Call Graph Construction Algorithms
-
November
-
D. Grove and C. Chambers. A Framework for Call Graph Construction Algorithms. ACM Trans. Program. Lang. Syst., 23(6):685-746, November 2001.
-
(2001)
ACM Trans. Program. Lang. Syst
, vol.23
, Issue.6
, pp. 685-746
-
-
Grove, D.1
Chambers, C.2
-
11
-
-
34247370090
-
-
IBM Corporation
-
IBM Corporation, Trade3 Benchmark, http://www.ibm.com/software/.
-
Trade3 Benchmark
-
-
-
12
-
-
0038507387
-
Alloy: A Lightweight Object Modelling Notation
-
D. Jackson. Alloy: A Lightweight Object Modelling Notation. ACM Trans. Softw. Eng. Methodol, 11(2):256-290, 2002.
-
(2002)
ACM Trans. Softw. Eng. Methodol
, vol.11
, Issue.2
, pp. 256-290
-
-
Jackson, D.1
-
13
-
-
0033698475
-
Alcoa: The Alloy Constraint Analyzer
-
Limerick, Ireland, ACM Press
-
D. Jackson, I. Schechter, and H. Shlyahter. Alcoa: The Alloy Constraint Analyzer. In Proceedings of the 22nd International Conference on Software Engineering, pages 730-733, Limerick, Ireland, 2000. ACM Press.
-
(2000)
Proceedings of the 22nd International Conference on Software Engineering
, pp. 730-733
-
-
Jackson, D.1
Schechter, I.2
Shlyahter, H.3
-
14
-
-
0034450091
-
XML Document Security Based on Provisional Authorization
-
Athens, Greece, Nov, ACM Press
-
M. Kudo and S. Hada. XML Document Security Based on Provisional Authorization. In Proceedings of the 7th ACM Conference on Computer and Communications Security, pages 87-96, Athens, Greece, Nov. 2000. ACM Press.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security
, pp. 87-96
-
-
Kudo, M.1
Hada, S.2
-
15
-
-
4544248702
-
XML Access Control Using Static Analysis
-
Washington, DC, USA, Oct, ACM Press
-
M. Murata, A. Tozawa, M. Kudo, and S. Hada. XML Access Control Using Static Analysis. In Proceedings of the 10th ACM Conference on Computer and Communications Security, pages 73-84, Washington, DC, USA, Oct. 2003. ACM Press.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 73-84
-
-
Murata, M.1
Tozawa, A.2
Kudo, M.3
Hada, S.4
-
16
-
-
34247402439
-
Enterprise JavaBeans Development Using VisualAge for Java. IBM Redbooks
-
San Jose, CA, USA, June
-
J. Picon, P. Genchi, M. Sahu, M. Weiss, and A. Dessureault. Enterprise JavaBeans Development Using VisualAge for Java. IBM Redbooks. IBM Corporation, International Technical Support Organization, San Jose, CA, USA, June 1999.
-
(1999)
IBM Corporation, International Technical Support Organization
-
-
Picon, J.1
Genchi, P.2
Sahu, M.3
Weiss, M.4
Dessureault, A.5
-
17
-
-
34548730944
-
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
-
Technical Report RC24056 W0609-065, IBM Corporation, Thomas J. Watson Research Center, Yorktown Heights, NY, USA, Sept
-
M. Pistoia, S. J. Fink, R. J. Flynn, and E. Yahav. When Role Models Have Flaws: Static Validation of Enterprise Security Policies. Technical Report RC24056 (W0609-065), IBM Corporation, Thomas J. Watson Research Center, Yorktown Heights, NY, USA, Sept. 2006.
-
(2006)
-
-
Pistoia, M.1
Fink, S.J.2
Flynn, R.J.3
Yahav, E.4
-
18
-
-
34247389562
-
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
-
Glasgow, Scotland, UK, July, Springer-Verlag
-
M. Pistoia, R. J. Flynn, L. Koved, and V. C. Sreedhar. Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection. In Proceedings of the 9th European Conference on Object-Oriented Programming, Glasgow, Scotland, UK, July 2005. Springer-Verlag.
-
(2005)
Proceedings of the 9th European Conference on Object-Oriented Programming
-
-
Pistoia, M.1
Flynn, R.J.2
Koved, L.3
Sreedhar, V.C.4
-
19
-
-
26444562678
-
-
Addison-Wesley, Reading, MA, USA, February
-
M. Pistoia, N. Nagaratnam, L. Koved, and A. Nadalin. Enterprise Java Security. Addison-Wesley, Reading, MA, USA, February 2004.
-
(2004)
Enterprise Java Security
-
-
Pistoia, M.1
Nagaratnam, N.2
Koved, L.3
Nadalin, A.4
-
20
-
-
0035009417
-
Analysis and Testing of Web Applications
-
Toronto, ON, Canada, IEEE Computer Society
-
F. Ricca and P. Tonella. Analysis and Testing of Web Applications. In Proceedings of the 23rd International Conference on Sofiware Engineering, pages 25-34, Toronto, ON, Canada, 2001. IEEE Computer Society.
-
(2001)
Proceedings of the 23rd International Conference on Sofiware Engineering
, pp. 25-34
-
-
Ricca, F.1
Tonella, P.2
-
21
-
-
0016555241
-
The Protection of Information in Computer Systems
-
Sept
-
J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE, volume 63, pages 1278-1308, Sept. 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
22
-
-
0030086382
-
Role-based access control models
-
Feb
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
23
-
-
0242625217
-
A Lightweight Approach to Specification and Analysis of Role-Based Access Control Extensions
-
Monterey, CA, USA, ACM Press
-
A. Schaad and J. D. Moffett. A Lightweight Approach to Specification and Analysis of Role-Based Access Control Extensions. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, pages 13-22, Monterey, CA, USA, 2002. ACM Press.
-
(2002)
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies
, pp. 13-22
-
-
Schaad, A.1
Moffett, J.D.2
-
24
-
-
34548745397
-
-
Standard Performance Evaluation Corporation Java Business Benchmark 2000 (SPECjbb2000), http://www.spec.org.
-
Standard Performance Evaluation Corporation Java Business Benchmark 2000 (SPECjbb2000), http://www.spec.org.
-
-
-
|