-
1
-
-
41549124129
-
-
Bauer, L., Ligatti, J., Walker, D.: More enforceable security policies. In: Cervesato, I. (ed.) Foundations of Computer Security: Proceedings of the FLoC 2002 workshop on Foundations of Computer Security, Copenhagen, Denmark, DIKU Technical Report, July 25-26, pp. 95-104 (2002)
-
Bauer, L., Ligatti, J., Walker, D.: More enforceable security policies. In: Cervesato, I. (ed.) Foundations of Computer Security: Proceedings of the FLoC 2002 workshop on Foundations of Computer Security, Copenhagen, Denmark, DIKU Technical Report, July 25-26, pp. 95-104 (2002)
-
-
-
-
2
-
-
31844433932
-
A language and system for composing security policies
-
Technical Report TR-699-04, Princeton University January
-
Bauer, L., Ligatti, J., Walker, D.: A language and system for composing security policies. Technical Report TR-699-04, Princeton University (January 2004)
-
(2004)
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
3
-
-
31844457357
-
Composing security policies with Polymer
-
New York, NY, USA, pp, ACM, New York
-
Bauer, L., Ligatti, J., Walker, D.: Composing security policies with Polymer. In: PLDl 2005: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, New York, NY, USA, pp. 305-314. ACM, New York (2005)
-
(2005)
PLDl 2005: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation
, pp. 305-314
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
4
-
-
0032667112
-
Patterns in property specifications for finite-state verification
-
Los Alamitos, CA, USA, pp, IEEE Computer Society Press, Los Alamitos
-
Dwyer, M.B., Avrunin, G.S., Corbett, J.C.: Patterns in property specifications for finite-state verification. In: ICSE 1999: Proceedings of the 21st international conference on Software engineering, Los Alamitos, CA, USA, pp. 411-420. IEEE Computer Society Press, Los Alamitos (1999)
-
(1999)
ICSE 1999: Proceedings of the 21st international conference on Software engineering
, pp. 411-420
-
-
Dwyer, M.B.1
Avrunin, G.S.2
Corbett, J.C.3
-
5
-
-
84982897952
-
History-based access-control for mobile code
-
Technical report, University of California at Santa Barbara, Santa Barbara, CA. USA
-
Edjlali, G., Acharya, A., Chaudhary, V.: History-based access-control for mobile code. Technical report, University of California at Santa Barbara, Santa Barbara, CA. USA (1998)
-
(1998)
-
-
Edjlali, G.1
Acharya, A.2
Chaudhary, V.3
-
6
-
-
0033724116
-
IRM enforcement of Java stack inspection
-
Washington, DC, USA, p, IEEE Computer Society, Los Alamitos
-
Erlingsson, U., Schneider, F.B.: IRM enforcement of Java stack inspection. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy (SP 2000), Washington, DC, USA, p. 246. IEEE Computer Society, Los Alamitos (2000)
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy (SP 2000)
, pp. 246
-
-
Erlingsson, U.1
Schneider, F.B.2
-
7
-
-
0032667877
-
Flexible policy-directed code safety
-
IEEE Computer Society Press. Los Alamitos
-
Evans, D., Twyman, A.: Flexible policy-directed code safety. In: IEEE Symposium on Security and Privacy, pp. 32-45. IEEE Computer Society Press. Los Alamitos (1999)
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 32-45
-
-
Evans, D.1
Twyman, A.2
-
9
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
Ligatti, J., Bauer, L., Walker, D.: Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security 4(1-2). 2-16 (2005)
-
(2005)
International Journal of Information Security
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
11
-
-
84878346861
-
Improving host security with system call policies
-
Paxson, V, ed, Washington, DC. USENIX, pp, August
-
th USENIX Security Symposium, Washington, DC. USENIX, pp. 128-146 (August 2003)
-
(2003)
th USENIX Security Symposium
, pp. 128-146
-
-
Provos, N.1
-
12
-
-
84881225236
-
Enforceable security policies
-
Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1). 30-50 (2000)
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
13
-
-
85084163313
-
Synthesizing fast intrusion prevention/detection systems from high-level specifications
-
Berkeley. CA. USA. p, USENIX Association
-
Sekar, R., Uppuluri, P.: Synthesizing fast intrusion prevention/detection systems from high-level specifications. In: SSYM 1999: Proceedings of the 8th conference on USENIX Security Symposium. Berkeley. CA. USA. p. 6, USENIX Association (1999)
-
(1999)
SSYM 1999: Proceedings of the 8th conference on USENIX Security Symposium
, pp. 6
-
-
Sekar, R.1
Uppuluri, P.2
|