-
1
-
-
33846012075
-
-
A. V. Aho, R. Sethi, and J. D. Ullman. Compilers:, Addison-Wesley, Reading, MA, USA, Jan
-
A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley, Reading, MA, USA, Jan. 1986.
-
(1986)
Principles, Techniques, and Tools
-
-
-
2
-
-
33845946966
-
-
Analysis and Specialization for the C Programming Language. PhD thesis, University of Copenhagen, May
-
L. O. Andersen. Program Analysis and Specialization for the C Programming Language. PhD thesis, University of Copenhagen, May 1994.
-
(1994)
Program
-
-
Andersen, L.O.1
-
3
-
-
18944377182
-
-
M. Bartoletti, P. Degano, and G. L. Ferrari. Static Analysis for Stack Inspection. In Proceedings of International Workshop on Concurrency and Coordination, Electronic Notes in Theoretical Computer Science, 54, Amsterdam, The Netherlands, 2001. Elsevier.
-
M. Bartoletti, P. Degano, and G. L. Ferrari. Static Analysis for Stack Inspection. In Proceedings of International Workshop on Concurrency and Coordination, Electronic Notes in Theoretical Computer Science, volume 54, Amsterdam, The Netherlands, 2001. Elsevier.
-
-
-
-
4
-
-
85084162287
-
Setuid Demystified
-
Berkeley, CA, USA, August, USENIX Association
-
H. Chen, D. Wagner, and D. Dean. Setuid Demystified. In Proceedings of the 11th USENIX Security Symposium, pages 171-190, Berkeley, CA, USA, August 2002. USENIX Association.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 171-190
-
-
Chen, H.1
Wagner, D.2
Dean, D.3
-
6
-
-
0029697575
-
Java Security: From HotJava to Netscape and beyond
-
Silver Spring, MD, USA, IEEE Computer Society Press
-
D. Dean, E. W. Felten, and D. S. Wallach. Java Security: From HotJava to Netscape and beyond. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 190-200, Silver Spring, MD, USA, 1996. IEEE Computer Society Press.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 190-200
-
-
Dean, D.1
Felten, E.W.2
Wallach, D.S.3
-
7
-
-
0037974167
-
Java Security: Web Browsers and Beyond
-
Technical Report 566-597, Princeton University, Princeton, NJ, USA, February
-
D. Dean, E. W. Felten, D. S. Wallach, and D. Balfanz. Java Security: Web Browsers and Beyond. Technical Report 566-597, Princeton University, Princeton, NJ, USA, February 1997.
-
(1997)
-
-
Dean, D.1
Felten, E.W.2
Wallach, D.S.3
Balfanz, D.4
-
8
-
-
0003396723
-
-
PhD thesis, Princeton University, Princeton, NJ, USA, Jan
-
R. D. Dean. Formal Aspects of Mobile Code Security. PhD thesis, Princeton University, Princeton, NJ, USA, Jan. 1999.
-
(1999)
Formal Aspects of Mobile Code Security
-
-
Dean, R.D.1
-
9
-
-
48649100590
-
-
Eclipse Project
-
Eclipse Project, http://www.eclipse.org.
-
-
-
-
10
-
-
48649086967
-
-
Equinox Project
-
Equinox Project, http://www.eclipse.org/equinox.
-
-
-
-
11
-
-
0033724116
-
IRM Enforcement of Java Stack Inspection
-
Oakland, CA, USA, May, IEEE Computer Society
-
U. Erlingsson and F. B. Schneider. IRM Enforcement of Java Stack Inspection. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, pages 246-255, Oakland, CA, USA, May 2000. IEEE Computer Society.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 246-255
-
-
Erlingsson, U.1
Schneider, F.B.2
-
13
-
-
21644484975
-
-
O'Reilly & Associates, Inc, Sebastopol, CA, USA, June
-
A. Freeman and A. Jones. Programming .NET Security. O'Reilly & Associates, Inc., Sebastopol, CA, USA, June 2003.
-
(2003)
Programming .NET Security
-
-
Freeman, A.1
Jones, A.2
-
14
-
-
0003801299
-
-
Addison-Wesley, Reading, MA, USA, second edition, May
-
L. Gong, G. Ellison, and M. Dageforde. Inside Java 2 Platform Security: Architecture, API Design, and Implementation. Addison-Wesley, Reading, MA, USA, second edition, May 2003.
-
(2003)
Inside Java 2 Platform Security: Architecture, API Design, and Implementation
-
-
Gong, L.1
Ellison, G.2
Dageforde, M.3
-
15
-
-
0004277741
-
-
Birkhäuser, Boston, MA, USA, second edition, January
-
G. Grätzer. General Lattice Theory. Birkhäuser, Boston, MA, USA, second edition, January 2003.
-
(2003)
General Lattice Theory
-
-
Grätzer, G.1
-
16
-
-
0011792814
-
A Framework for Call Graph Construction Algorithms
-
November
-
D. Grove and C. Chambers. A Framework for Call Graph Construction Algorithms. ACM Trans. Program. Lang. Syst., 23(6):685-746, November 2001.
-
(2001)
ACM Trans. Program. Lang. Syst
, vol.23
, Issue.6
, pp. 685-746
-
-
Grove, D.1
Chambers, C.2
-
18
-
-
0032667088
-
Verification of Control Flow Based Security Properties
-
Oakland, CA, USA, May
-
T. P. Jensen, D. L. Mëtayer, and T. Thorn. Verification of Control Flow Based Security Properties. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, pages 89-103, Oakland, CA, USA, May 1999.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 89-103
-
-
Jensen, T.P.1
Mëtayer, D.L.2
Thorn, T.3
-
19
-
-
0022278941
-
A Security Analysis of VAX VMS
-
ACM Press
-
J. F. Koegel, R. M. Koegel, Z. Li, and D. T. Miruke. A Security Analysis of VAX VMS. In ACM '85: Proceedings of the 1985 ACM Annual Conference on the Range of Computing: Mid-80's Perspective, pages 381-386. ACM Press, 1985.
-
(1985)
ACM '85: Proceedings of the 1985 ACM Annual Conference on the Range of Computing: Mid-80's Perspective
, pp. 381-386
-
-
Koegel, J.F.1
Koegel, R.M.2
Li, Z.3
Miruke, D.T.4
-
20
-
-
0038108908
-
Access Rights Analysis for Java
-
Seattle, WA, USA, November, ACM Press
-
L. Koved, M. Pistoia, and A. Kershenbaum. Access Rights Analysis for Java. In Proceedings of the 17th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, pages 359-372, Seattle, WA, USA, November 2002. ACM Press.
-
(2002)
Proceedings of the 17th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications
, pp. 359-372
-
-
Koved, L.1
Pistoia, M.2
Kershenbaum, A.3
-
23
-
-
34547721788
-
MASSA: Mobile Agents Security through Static/Dynamic Analysis
-
Toronto, Canada, April
-
A. Orso, M. J. Harrold, and G. Vigna. MASSA: Mobile Agents Security through Static/Dynamic Analysis. In Proceedings of the First ICSE Workshop on Software Engineering and Mobility (WSEM 2001), Toronto, Canada, April 2001.
-
(2001)
Proceedings of the First ICSE Workshop on Software Engineering and Mobility (WSEM 2001)
-
-
Orso, A.1
Harrold, M.J.2
Vigna, G.3
-
25
-
-
34548708576
-
Beyond Stack Inspection: A Unified Access Control and Information Flow Security Model
-
Oakland, CA, USA, May
-
M. Pistoia, A. Banerjee, and D. A. Naumann. Beyond Stack Inspection: A Unified Access Control and Information Flow Security Model. In 28th IEEE Symposium on Security and Privacy, pages 149-163, Oakland, CA, USA, May 2007.
-
(2007)
28th IEEE Symposium on Security and Privacy
, pp. 149-163
-
-
Pistoia, M.1
Banerjee, A.2
Naumann, D.A.3
-
26
-
-
26444502057
-
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
-
Glasgow, Scotland, UK, July, Springer-Verlag
-
M. Pistoia, R. J. Flynn, L. Koved, and V. C. Sreedhar. Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection. In Proceedings of the 19th European Conference on Object-Oriented Programming, pages 362-386, Glasgow, Scotland, UK, July 2005. Springer-Verlag.
-
(2005)
Proceedings of the 19th European Conference on Object-Oriented Programming
, pp. 362-386
-
-
Pistoia, M.1
Flynn, R.J.2
Koved, L.3
Sreedhar, V.C.4
-
27
-
-
26444562678
-
-
Addison-Wesley, Reading, MA, USA, February
-
M. Pistoia, N. Nagaratnam, L. Koved, and A. Nadalin. Enterprise Java Security. Addison-Wesley, Reading, MA, USA, February 2004.
-
(2004)
Enterprise Java Security
-
-
Pistoia, M.1
Nagaratnam, N.2
Koved, L.3
Nadalin, A.4
-
28
-
-
0004286931
-
-
Prentice Hall PTR, Upper Saddle River, NJ, USA, second edition, August
-
M. Pistoia, D. Reller, D. Gupta, M. Nagnur, and A. K. Ramani. Java 2 Network Security. Prentice Hall PTR, Upper Saddle River, NJ, USA, second edition, August 1999.
-
(1999)
Java 2 Network Security
-
-
Pistoia, M.1
Reller, D.2
Gupta, D.3
Nagnur, M.4
Ramani, A.K.5
-
30
-
-
35248819232
-
Dimensions of Precision in Reference Analysis of Object-Oriented Languages
-
Warsaw, Poland, April, Invited Paper
-
B. G. Ryder. Dimensions of Precision in Reference Analysis of Object-Oriented Languages. In Proceedings of the 12th International Conference on Compiler Construction, pages 126-137, Warsaw, Poland, April 2003. Invited Paper.
-
(2003)
Proceedings of the 12th International Conference on Compiler Construction
, pp. 126-137
-
-
Ryder, B.G.1
-
31
-
-
0016555241
-
The Protection of Information in Computer Systems
-
Sept
-
J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE, volume 63, pages 1278-1308, Sept. 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
32
-
-
48649087125
-
-
SourceForge.net, http://www.sourceforge.net.
-
-
-
-
34
-
-
0003396725
-
-
PhD thesis, Princeton University, Princeton, NJ, USA, Jan
-
D. S. Wallach. A New Approach to Mobile-Code Security. PhD thesis, Princeton University, Princeton, NJ, USA, Jan. 1999.
-
(1999)
A New Approach to Mobile-Code Security
-
-
Wallach, D.S.1
-
35
-
-
0031542975
-
Extensible Security Architectures for Java
-
Saint Malo, France, ACM Press
-
D. S. Wallach, D. Balfanz, D. Dean, and E. W. Felten. Extensible Security Architectures for Java. In Proceedings of the 16th ACM Symposium on Operating Systems Principles, pages 116-128, Saint Malo, France, 1997. ACM Press.
-
(1997)
Proceedings of the 16th ACM Symposium on Operating Systems Principles
, pp. 116-128
-
-
Wallach, D.S.1
Balfanz, D.2
Dean, D.3
Felten, E.W.4
-
36
-
-
0031677290
-
Understanding Java Stack Inspection
-
Oakland, CA, USA, May
-
D. S. Wallach and E. W. Felten. Understanding Java Stack Inspection. In Proceedings of the 1998 IEEE Symposium on Security and Privacy, pages 52-63, Oakland, CA, USA, May 1998.
-
(1998)
Proceedings of the 1998 IEEE Symposium on Security and Privacy
, pp. 52-63
-
-
Wallach, D.S.1
Felten, E.W.2
-
37
-
-
34247343731
-
The Case for Analysis Preserving Language Transformation
-
ACM Press, July
-
X. Zhang, L. Koved, M. Pistoia, S. Weber, T. Jaeger, G. Marceau, and L. Zeng. The Case for Analysis Preserving Language Transformation. In Proceedings of the ACM SIGSOFT 2006 International Symposium on Software Testing and Analysis (ISSTA). ACM Press, July 2006.
-
(2006)
Proceedings of the ACM SIGSOFT 2006 International Symposium on Software Testing and Analysis (ISSTA)
-
-
Zhang, X.1
Koved, L.2
Pistoia, M.3
Weber, S.4
Jaeger, T.5
Marceau, G.6
Zeng, L.7
|