메뉴 건너뛰기




Volumn 2004, Issue , 2004, Pages 43-55

Access control by tracking shallow execution history

Author keywords

[No Author keywords available]

Indexed keywords

EXECUTION MONITORING (EM); LOW-WATER-MARK POLICIES; SECURITY POLICIES; SOFTWARE EXECUTION;

EID: 3543121920     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.2004.1301314     Document Type: Conference Paper
Times cited : (107)

References (32)
  • 2
    • 0023558367 scopus 로고
    • Recognizing safety and liveness
    • B. Alpern and F. B. Schneider. Recognizing safety and liveness. Distributed Computing, 2(3):117-126, 1987.
    • (1987) Distributed Computing , vol.2 , Issue.3 , pp. 117-126
    • Alpern, B.1    Schneider, F.B.2
  • 5
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • U. S. Air Force Electronic Systems Division
    • K. Biba. Integrity considerations for secure computer systems. Technical Report 76-372, U. S. Air Force Electronic Systems Division, 1977.
    • (1977) Technical Report , vol.76 , Issue.372
    • Biba, K.1
  • 16
    • 3543139162 scopus 로고    scopus 로고
    • Computability classes for enforcement mechanisms
    • Computer Science Department, Cornell University, Aug.
    • K. W. Hamlen, G. Morrisett, and F. B. Schneider. Computability classes for enforcement mechanisms. Technical Report TR 2003-1908, Computer Science Department, Cornell University, Aug. 2003.
    • (2003) Technical Report , vol.TR 2003-1908
    • Hamlen, K.W.1    Morrisett, G.2    Schneider, F.B.3
  • 31
    • 0036426315 scopus 로고    scopus 로고
    • Using reflection as a mechanism for enforcing security policies on compiled code
    • I. Welch and R. J. Stroud. Using reflection as a mechanism for enforcing security policies on compiled code. Journal of Computer Security, 10(4):399-432, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.4 , pp. 399-432
    • Welch, I.1    Stroud, R.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.