-
1
-
-
40149087446
-
-
L. Bauer, J. Ligatti, D. Walker, More enforceable security policies, in: Foundations of Computer Security, Copenhagen, Denmark, 2002, pp. 95-104.
-
L. Bauer, J. Ligatti, D. Walker, More enforceable security policies, in: Foundations of Computer Security, Copenhagen, Denmark, 2002, pp. 95-104.
-
-
-
-
2
-
-
31844457357
-
Composing security policies with polymer
-
Bauer L., Ligatti J., and Walker D. Composing security policies with polymer. SIGPLAN Not 40 6 (2005) 305-314
-
(2005)
SIGPLAN Not
, vol.40
, Issue.6
, pp. 305-314
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
4
-
-
40149101066
-
-
K. Biba, Integrity considerations for secure computer systems, Technical Report 76-372, US Air Force Electronic Systems Division, 1977.
-
K. Biba, Integrity considerations for secure computer systems, Technical Report 76-372, US Air Force Electronic Systems Division, 1977.
-
-
-
-
5
-
-
40149111802
-
-
W.E. Boebert, R.Y. Kain, A practical alternative to hierarchical integrity policies, in: Proceedings of the 8th National Computer Security Conference, 1985, pp. 18-27.
-
W.E. Boebert, R.Y. Kain, A practical alternative to hierarchical integrity policies, in: Proceedings of the 8th National Computer Security Conference, 1985, pp. 18-27.
-
-
-
-
6
-
-
0024663219
-
-
D.F.C. Brewer, M.J. Nash, The Chinese wall security policy, in: IEEE Symposium on Security and Privacy, 1989, pp. 206-214.
-
D.F.C. Brewer, M.J. Nash, The Chinese wall security policy, in: IEEE Symposium on Security and Privacy, 1989, pp. 206-214.
-
-
-
-
7
-
-
0347269342
-
Families of locally testable languages
-
Caron P. Families of locally testable languages. Theor. Comput. Sci. 242 1-2 (2000) 361-376
-
(2000)
Theor. Comput. Sci.
, vol.242
, Issue.1-2
, pp. 361-376
-
-
Caron, P.1
-
8
-
-
0032218233
-
-
G. Edjladi, A. Acharya, V. Chaudhary, History-based access control for mobile code, in: 5th ACM Conference on Computer and Communications Security, San Francisco, CA, USA, 1998, pp. 38-48.
-
G. Edjladi, A. Acharya, V. Chaudhary, History-based access control for mobile code, in: 5th ACM Conference on Computer and Communications Security, San Francisco, CA, USA, 1998, pp. 38-48.
-
-
-
-
9
-
-
3543121920
-
-
P.W.L. Fong, Access control by tracking shallow execution history, in: Proceedings of the 2004 IEEE Symposium on Security and Privacy, Berkeley, CA, 2004.
-
P.W.L. Fong, Access control by tracking shallow execution history, in: Proceedings of the 2004 IEEE Symposium on Security and Privacy, Berkeley, CA, 2004.
-
-
-
-
10
-
-
0036041144
-
-
C. Fournet, A.D. Gordon, Stack inspection: theory and variants, in: Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, ACM Press, 2002, pp. 307-318.
-
C. Fournet, A.D. Gordon, Stack inspection: theory and variants, in: Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, ACM Press, 2002, pp. 307-318.
-
-
-
-
11
-
-
0021426851
-
A note on denial-of-service in operating systems
-
Gligor V.D. A note on denial-of-service in operating systems. IEEE Trans. Software Eng. 10 3 (1984) 320-324
-
(1984)
IEEE Trans. Software Eng.
, vol.10
, Issue.3
, pp. 320-324
-
-
Gligor, V.D.1
-
13
-
-
0026243650
-
A polynomial time algorithm for the local testability problem of deterministic finite automata
-
Kim S., McNaughton R., and McCloskey R. A polynomial time algorithm for the local testability problem of deterministic finite automata. IEEE Trans. Comput. 40 (1991) 1087-1093
-
(1991)
IEEE Trans. Comput.
, vol.40
, pp. 1087-1093
-
-
Kim, S.1
McNaughton, R.2
McCloskey, R.3
-
14
-
-
0028743322
-
Computing the order of a locally testable automaton
-
Kim S., and McNaughton R. Computing the order of a locally testable automaton. SIAM J. Comput. 23 (1994) 1193-1215
-
(1994)
SIAM J. Comput.
, vol.23
, pp. 1193-1215
-
-
Kim, S.1
McNaughton, R.2
-
15
-
-
40149099687
-
-
O. Kupferman, Y. Lustig, M.Y. Vardi, On locally checkable properties, in: Proceedings of the 13th International Conference on Logic for Programming Artificial Intelligence and Reasoning (LPAR 2006), 2006.
-
O. Kupferman, Y. Lustig, M.Y. Vardi, On locally checkable properties, in: Proceedings of the 13th International Conference on Logic for Programming Artificial Intelligence and Reasoning (LPAR 2006), 2006.
-
-
-
-
16
-
-
0017472779
-
Proving the correctness of multiprocess programs
-
Lamport L. Proving the correctness of multiprocess programs. IEEE Trans. Software Eng. 3 2 (1977) 125-143
-
(1977)
IEEE Trans. Software Eng.
, vol.3
, Issue.2
, pp. 125-143
-
-
Lamport, L.1
-
17
-
-
40149100416
-
-
B. Lampson, Protection, in: Proceedings 5th Symposium on Information Sciences and Systems, Princeton, New Jersey, 1971, pp. 437-443.
-
B. Lampson, Protection, in: Proceedings 5th Symposium on Information Sciences and Systems, Princeton, New Jersey, 1971, pp. 437-443.
-
-
-
-
18
-
-
13444275220
-
-
J. Ligatti, L. Bauer, D. Walker, Edit automata: enforcement mechanisms for run-time security policies, Int. J. Inform. Secur. 4 (1-2) (2005) 2-16 (Published online 26 Oct 2004).
-
J. Ligatti, L. Bauer, D. Walker, Edit automata: enforcement mechanisms for run-time security policies, Int. J. Inform. Secur. 4 (1-2) (2005) 2-16 (Published online 26 Oct 2004).
-
-
-
-
19
-
-
40149107825
-
-
J. Ligatti, L. Bauer, D. Walker, Enforcing non-safety security policies with program monitors, Technical Report TR-720-05, Princeton University, January 2005.
-
J. Ligatti, L. Bauer, D. Walker, Enforcing non-safety security policies with program monitors, Technical Report TR-720-05, Princeton University, January 2005.
-
-
-
-
20
-
-
33646066871
-
-
J. Ligatti, L. Bauer, D. Walker, Enforcing non-safety security policies with program monitors, in: Computer Security-ESORICS 2005: 10th European Symposium on Research in Computer Security, in: Lecture Notes in Computer Science, vol. 3679, 2005, pp. 355-373.
-
J. Ligatti, L. Bauer, D. Walker, Enforcing non-safety security policies with program monitors, in: Computer Security-ESORICS 2005: 10th European Symposium on Research in Computer Security, in: Lecture Notes in Computer Science, vol. 3679, 2005, pp. 355-373.
-
-
-
-
21
-
-
40149102760
-
-
A. Magnaghi, H. Tanaka, An efficient algorithm for order evaluation of strict locally testable languages.
-
A. Magnaghi, H. Tanaka, An efficient algorithm for order evaluation of strict locally testable languages.
-
-
-
-
23
-
-
40149102472
-
-
D. Perrin, J.-E. Pin, Infinite words. Automata, semigroups, logic and games, Pure and Applied Mathematics, vol. 141, Elsevier, 2004.
-
D. Perrin, J.-E. Pin, Infinite words. Automata, semigroups, logic and games, Pure and Applied Mathematics, vol. 141, Elsevier, 2004.
-
-
-
-
24
-
-
0002230149
-
Finite semigroups and recognizable languages : an introduction
-
Fountain J. (Ed), Kluwer academic publishers
-
Pin J.E. Finite semigroups and recognizable languages : an introduction. In: Fountain J. (Ed). NATO Advanced Study Institute Semigroups, Formal Languages and Groups (1995), Kluwer academic publishers 1-32
-
(1995)
NATO Advanced Study Institute Semigroups, Formal Languages and Groups
, pp. 1-32
-
-
Pin, J.E.1
-
26
-
-
40149083041
-
-
A. Taivalsaari, Java Specification Request 139 J2ME Connected Limited Device Configuration 1.1, March 2003.
-
A. Taivalsaari, Java Specification Request 139 J2ME Connected Limited Device Configuration 1.1, March 2003.
-
-
-
-
27
-
-
0346303936
-
A polynomial time algorithm for local testability and its level
-
Trahtman A.N. A polynomial time algorithm for local testability and its level. J. Algebra Comput. 9 1 (1998) 1-2
-
(1998)
J. Algebra Comput.
, vol.9
, Issue.1
, pp. 1-2
-
-
Trahtman, A.N.1
-
28
-
-
84908308177
-
An algorithm to verify local threshold testability of deterministic finite automata
-
Trahtman A.N. An algorithm to verify local threshold testability of deterministic finite automata. Lecture Notes Comput. Sci. 2214 (2001) 164-171
-
(2001)
Lecture Notes Comput. Sci.
, vol.2214
, pp. 164-171
-
-
Trahtman, A.N.1
-
29
-
-
21144433767
-
A polynomial time algorithm for left [right] local testability
-
Trahtman A.N. A polynomial time algorithm for left [right] local testability. Lecture Notes Comput. Sci. 2608 (2003) 203-212
-
(2003)
Lecture Notes Comput. Sci.
, vol.2608
, pp. 203-212
-
-
Trahtman, A.N.1
-
30
-
-
40149087292
-
-
M. Viswanathan, Foundations for the Run-time Analysis of Software Systems, Ph.D. thesis, University of Pennsylvania, 2000.
-
M. Viswanathan, Foundations for the Run-time Analysis of Software Systems, Ph.D. thesis, University of Pennsylvania, 2000.
-
-
-
-
31
-
-
40149095042
-
-
W.D. Young, P.A. Telega, W.E. Boebert, A verified labler for the secure ada target, in: In Proceedings of the 9th National Computer Security Conference, 1986, pp. 55-61.
-
W.D. Young, P.A. Telega, W.E. Boebert, A verified labler for the secure ada target, in: In Proceedings of the 9th National Computer Security Conference, 1986, pp. 55-61.
-
-
-
-
32
-
-
40149099429
-
-
A Package TESTAS for Checking Some Kinds of Testability.
-
A Package TESTAS for Checking Some Kinds of Testability.
-
-
-
|