메뉴 건너뛰기




Volumn , Issue , 2007, Pages 292-301

Combining static and dynamic analysis for automatic identification of precise access-control policies

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; AUTOMATION; CHLORINE COMPOUNDS; CODES (STANDARDS); CODES (SYMBOLS); COMPUTER APPLICATIONS; COMPUTER PROGRAMMING LANGUAGES; COMPUTER SOFTWARE; CONCURRENCY CONTROL; CONTROL SYSTEM ANALYSIS; CONTROL SYSTEMS; CONTROL THEORY; DYNAMIC ANALYSIS; ELECTRIC LOAD SHEDDING; ELECTRONIC DATA INTERCHANGE; FAILURE ANALYSIS; JAVA PROGRAMMING LANGUAGE; QUALITY ASSURANCE; RELIABILITY; RISK ANALYSIS; RISK ASSESSMENT; SECURITY OF DATA; SECURITY SYSTEMS; STATIC ANALYSIS;

EID: 43449135873     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2007.39     Document Type: Conference Paper
Times cited : (16)

References (37)
  • 1
    • 33846012075 scopus 로고
    • A. V. Aho, R. Sethi, and J. D. Ullman. Compilers:, Addison-Wesley, Reading, MA, USA, Jan
    • A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley, Reading, MA, USA, Jan. 1986.
    • (1986) Principles, Techniques, and Tools
  • 2
    • 33845946966 scopus 로고
    • Analysis and Specialization for the C Programming Language. PhD thesis, University of Copenhagen, May
    • L. O. Andersen. Program Analysis and Specialization for the C Programming Language. PhD thesis, University of Copenhagen, May 1994.
    • (1994) Program
    • Andersen, L.O.1
  • 3
    • 18944377182 scopus 로고    scopus 로고
    • M. Bartoletti, P. Degano, and G. L. Ferrari. Static Analysis for Stack Inspection. In Proceedings of International Workshop on Concurrency and Coordination, Electronic Notes in Theoretical Computer Science, 54, Amsterdam, The Netherlands, 2001. Elsevier.
    • M. Bartoletti, P. Degano, and G. L. Ferrari. Static Analysis for Stack Inspection. In Proceedings of International Workshop on Concurrency and Coordination, Electronic Notes in Theoretical Computer Science, volume 54, Amsterdam, The Netherlands, 2001. Elsevier.
  • 7
    • 0037974167 scopus 로고    scopus 로고
    • Java Security: Web Browsers and Beyond
    • Technical Report 566-597, Princeton University, Princeton, NJ, USA, February
    • D. Dean, E. W. Felten, D. S. Wallach, and D. Balfanz. Java Security: Web Browsers and Beyond. Technical Report 566-597, Princeton University, Princeton, NJ, USA, February 1997.
    • (1997)
    • Dean, D.1    Felten, E.W.2    Wallach, D.S.3    Balfanz, D.4
  • 9
    • 48649100590 scopus 로고    scopus 로고
    • Eclipse Project
    • Eclipse Project, http://www.eclipse.org.
  • 10
    • 48649086967 scopus 로고    scopus 로고
    • Equinox Project
    • Equinox Project, http://www.eclipse.org/equinox.
  • 13
    • 21644484975 scopus 로고    scopus 로고
    • O'Reilly & Associates, Inc, Sebastopol, CA, USA, June
    • A. Freeman and A. Jones. Programming .NET Security. O'Reilly & Associates, Inc., Sebastopol, CA, USA, June 2003.
    • (2003) Programming .NET Security
    • Freeman, A.1    Jones, A.2
  • 15
    • 0004277741 scopus 로고    scopus 로고
    • Birkhäuser, Boston, MA, USA, second edition, January
    • G. Grätzer. General Lattice Theory. Birkhäuser, Boston, MA, USA, second edition, January 2003.
    • (2003) General Lattice Theory
    • Grätzer, G.1
  • 16
    • 0011792814 scopus 로고    scopus 로고
    • A Framework for Call Graph Construction Algorithms
    • November
    • D. Grove and C. Chambers. A Framework for Call Graph Construction Algorithms. ACM Trans. Program. Lang. Syst., 23(6):685-746, November 2001.
    • (2001) ACM Trans. Program. Lang. Syst , vol.23 , Issue.6 , pp. 685-746
    • Grove, D.1    Chambers, C.2
  • 25
    • 34548708576 scopus 로고    scopus 로고
    • Beyond Stack Inspection: A Unified Access Control and Information Flow Security Model
    • Oakland, CA, USA, May
    • M. Pistoia, A. Banerjee, and D. A. Naumann. Beyond Stack Inspection: A Unified Access Control and Information Flow Security Model. In 28th IEEE Symposium on Security and Privacy, pages 149-163, Oakland, CA, USA, May 2007.
    • (2007) 28th IEEE Symposium on Security and Privacy , pp. 149-163
    • Pistoia, M.1    Banerjee, A.2    Naumann, D.A.3
  • 30
    • 35248819232 scopus 로고    scopus 로고
    • Dimensions of Precision in Reference Analysis of Object-Oriented Languages
    • Warsaw, Poland, April, Invited Paper
    • B. G. Ryder. Dimensions of Precision in Reference Analysis of Object-Oriented Languages. In Proceedings of the 12th International Conference on Compiler Construction, pages 126-137, Warsaw, Poland, April 2003. Invited Paper.
    • (2003) Proceedings of the 12th International Conference on Compiler Construction , pp. 126-137
    • Ryder, B.G.1
  • 31
    • 0016555241 scopus 로고
    • The Protection of Information in Computer Systems
    • Sept
    • J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE, volume 63, pages 1278-1308, Sept. 1975.
    • (1975) Proceedings of the IEEE , vol.63 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 32
    • 48649087125 scopus 로고    scopus 로고
    • SourceForge.net, http://www.sourceforge.net.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.