-
1
-
-
47249116548
-
-
Chess, B., O'Neil, Y.T., West, J.: Javascript hijacking. Technical report, Fortify Software (2007), http://www.fortifysoftware.com/news-events/ releases/2007/2007-04-02.jsp
-
Chess, B., O'Neil, Y.T., West, J.: Javascript hijacking. Technical report, Fortify Software (2007), http://www.fortifysoftware.com/news-events/ releases/2007/2007-04-02.jsp
-
-
-
-
2
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst. 10(4), 265-310 (1992)
-
(1992)
ACM Trans. Comput. Syst
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
3
-
-
0028380781
-
Authentication in the Taos operating system
-
Wobber, E., Abadi, M., Burrows, M., Lampson, B.: Authentication in the Taos operating system. ACM Trans. Comput. Syst. 12(1), 3-32 (1994)
-
(1994)
ACM Trans. Comput. Syst
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
-
4
-
-
0033715532
-
-
Abadi, M., Fournet, C., Gonthier, G.: Authentication primitives and their compilation. In: POPL, pp. 302-315 (2000)
-
Abadi, M., Fournet, C., Gonthier, G.: Authentication primitives and their compilation. In: POPL, pp. 302-315 (2000)
-
-
-
-
6
-
-
21644477867
-
Securing Java RMI-based distributed applications. In: ACSAC
-
Los Alamitos
-
Li, N., Mitchell, J.C., Tong, D.: Securing Java RMI-based distributed applications. In: ACSAC, pp. 262-271. IEEE Computer Society, Los Alamitos (2004)
-
(2004)
IEEE Computer Society
, pp. 262-271
-
-
Li, N.1
Mitchell, J.C.2
Tong, D.3
-
7
-
-
47249137384
-
-
Scheifler, B., Venners, B.: A conversation with Bob Scheifler, part I, by Bill Venners (2002), http://www.artima.com/intv/jinisecu.html
-
(2002)
A conversation with Bob Scheifler, part I, by Bill Venners
-
-
Scheifler, B.1
Venners, B.2
-
8
-
-
26844492006
-
-
Gordon, A.D., Pucella, R.: Validating a web service security abstraction by typing. Formal Asp. Comput. 17(3), 277-318 (2005)
-
Gordon, A.D., Pucella, R.: Validating a web service security abstraction by typing. Formal Asp. Comput. 17(3), 277-318 (2005)
-
-
-
-
9
-
-
0027667638
-
A calculus for access control in distributed systems
-
Abadi, M., Burrows, M., Lampson, B.W., Plotkin, G.D.: A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst. 15(4), 706-734 (1993)
-
(1993)
ACM Trans. Program. Lang. Syst
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.W.3
Plotkin, G.D.4
-
10
-
-
33750387038
-
-
Abadi, M.: Access control in a core calculus of dependency. In: ICFP, pp. 263-273. ACM, New York (2006)
-
Abadi, M.: Access control in a core calculus of dependency. In: ICFP, pp. 263-273. ACM, New York (2006)
-
-
-
-
11
-
-
33947650706
-
Non-interference in constructive authorization logic
-
Garg, D., Pfenning, F.: Non-interference in constructive authorization logic. CSFW 19, 283-296 (2006)
-
(2006)
CSFW
, vol.19
, pp. 283-296
-
-
Garg, D.1
Pfenning, F.2
-
12
-
-
33750280592
-
A linear logic of authorization and knowledge
-
Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
-
Garg, D., Bauer, L., Bowers, K.D., Pfenning, F., Reiter, M.K.: A linear logic of authorization and knowledge. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 297-312. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4189
, pp. 297-312
-
-
Garg, D.1
Bauer, L.2
Bowers, K.D.3
Pfenning, F.4
Reiter, M.K.5
-
14
-
-
35048817499
-
A type discipline for authorization in distributed systems
-
Los Alamitos
-
Fournet, C., Gordon, A.D., Maffeis, S.: A type discipline for authorization in distributed systems. In: CSF, IEEE Computer Society Press, Los Alamitos (2007)
-
(2007)
CSF, IEEE Computer Society Press
-
-
Fournet, C.1
Gordon, A.D.2
Maffeis, S.3
-
15
-
-
35048840249
-
-
Cirillo, A., Jagadeesan, R., Pitcher, C., Riely, J.: Do As I SaY! programmatic access control with explicit identities. In: CSF, IEEE, Los Alamitos (2007)
-
Cirillo, A., Jagadeesan, R., Pitcher, C., Riely, J.: Do As I SaY! programmatic access control with explicit identities. In: CSF, IEEE, Los Alamitos (2007)
-
-
-
-
16
-
-
0141863341
-
Authenticity by typing for security protocols
-
Gordon, A.D., Jeffrey, A.: Authenticity by typing for security protocols. Journal of Computer Security 11(4), 451-520 (2003)
-
(2003)
Journal of Computer Security
, vol.11
, Issue.4
, pp. 451-520
-
-
Gordon, A.D.1
Jeffrey, A.2
-
17
-
-
35448946495
-
Provenance in databases
-
ACM, New York
-
Buneman, P., Tan, W.C.: Provenance in databases. In: SIGMOD Conference, pp. 1171-1173. ACM, New York (2007)
-
(2007)
SIGMOD Conference
, pp. 1171-1173
-
-
Buneman, P.1
Tan, W.C.2
-
18
-
-
0039334688
-
SAFKASI: A security mechanism for language-based systems
-
Wallach, D.S., Appel, A.W., Felten, E.W.: SAFKASI: a security mechanism for language-based systems. ACM Trans. Softw. Eng. Methodol. 9(4), 341-378 (2000)
-
(2000)
ACM Trans. Softw. Eng. Methodol
, vol.9
, Issue.4
, pp. 341-378
-
-
Wallach, D.S.1
Appel, A.W.2
Felten, E.W.3
-
21
-
-
85030037503
-
-
Lucassen, J.M., Gifford, D.K.: Polymorphic effect systems. In: POPL, pp. 47-57 (1988)
-
Lucassen, J.M., Gifford, D.K.: Polymorphic effect systems. In: POPL, pp. 47-57 (1988)
-
-
-
-
22
-
-
84974191759
-
Polymorphic type, region and effect inference
-
Talpin, J., Jouvelot, P.: Polymorphic type, region and effect inference. J. Funct. Program. 2(3), 245-271 (1992)
-
(1992)
J. Funct. Program
, vol.2
, Issue.3
, pp. 245-271
-
-
Talpin, J.1
Jouvelot, P.2
-
23
-
-
0000549632
-
The type and effect discipline
-
Talpin, J., Jouvelot, P.: The type and effect discipline. Inf. Comput. 111(2), 245-296 (1994)
-
(1994)
Inf. Comput
, vol.111
, Issue.2
, pp. 245-296
-
-
Talpin, J.1
Jouvelot, P.2
-
24
-
-
1442284573
-
MJ: An imperative core calculus for Java and Java with effects
-
Technical Report 563, Cambridge University Computer Laboratory
-
Bierman, G., Parkinson, M., Pitts, A.: MJ: An imperative core calculus for Java and Java with effects. Technical Report 563, Cambridge University Computer Laboratory (2003)
-
(2003)
-
-
Bierman, G.1
Parkinson, M.2
Pitts, A.3
-
25
-
-
84947944620
-
An object-oriented effects system
-
Guerraoui, R, ed, ECOOP 1999, Springer, Heidelberg
-
Greenhouse, A., Boyland, J.: An object-oriented effects system. In: Guerraoui, R. (ed.) ECOOP 1999. LNCS, vol. 1628, pp. 205-229. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1628
, pp. 205-229
-
-
Greenhouse, A.1
Boyland, J.2
-
26
-
-
36048984982
-
Encapsulating objects with confined types
-
to appear
-
Grothoff, C., Palsberg, J., Vitek, J.: Encapsulating objects with confined types. In: TOPLAS (to appear, 2007)
-
(2007)
TOPLAS
-
-
Grothoff, C.1
Palsberg, J.2
Vitek, J.3
-
27
-
-
33750278997
-
Featherweight generic confinement
-
Potanin, A., Noble, J., Clarke, D., Biddle, R.: Featherweight generic confinement. J. Funct. Program. 16(6), 793-811 (2006)
-
(2006)
J. Funct. Program
, vol.16
, Issue.6
, pp. 793-811
-
-
Potanin, A.1
Noble, J.2
Clarke, D.3
Biddle, R.4
-
28
-
-
0142156593
-
3
-
Blundo, C, Laneve, C, eds, ICTCS 2003, Springer, Heidelberg
-
3. In: Blundo, C., Laneve, C. (eds.) ICTCS 2003. LNCS, vol. 2841, pp. 97-110. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2841
, pp. 97-110
-
-
Damiani, F.1
Drossopoulou, S.2
Giannini, P.3
-
29
-
-
0034826554
-
Enforcing high-level protocols in low-level software
-
DeLine, R., Fähndrich, M.: Enforcing high-level protocols in low-level software. In: PLDI, pp. 59-69 (2001)
-
(2001)
PLDI
, pp. 59-69
-
-
DeLine, R.1
Fähndrich, M.2
-
30
-
-
33646191938
-
-
Dezani-Ciancaglini, M., Yoshida, N., Ahern, A., Drossopoulou, S.: A distributed object-oriented language with session types. In: De Nicola, R., Sangiorgi, D. (eds.) TGC 2005. LNCS, 3705, pp. 299-318. Springer, Heidelberg (2005)
-
Dezani-Ciancaglini, M., Yoshida, N., Ahern, A., Drossopoulou, S.: A distributed object-oriented language with session types. In: De Nicola, R., Sangiorgi, D. (eds.) TGC 2005. LNCS, vol. 3705, pp. 299-318. Springer, Heidelberg (2005)
-
-
-
-
31
-
-
24644447402
-
-
Fournet, C., Gordon, A.D., Maffeis, S.: A type discipline for authorization policies. In: Sagiv, M. (ed.) ESOP 2005. LNCS, 3444, pp. 141-156. Springer, Heidelberg (2005)
-
Fournet, C., Gordon, A.D., Maffeis, S.: A type discipline for authorization policies. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 141-156. Springer, Heidelberg (2005)
-
-
-
-
33
-
-
0031674984
-
-
Flatt, M., Krishnamurthi, S., Felleisen, M.: Classes and mixins. In: POPL, pp. 171-183 (1998)
-
Flatt, M., Krishnamurthi, S., Felleisen, M.: Classes and mixins. In: POPL, pp. 171-183 (1998)
-
-
-
-
34
-
-
0033203773
-
-
Igarashi, A., Pierce, B., Wadler, P.: Featherweight Java: A minimal core calculus for Java and GJ. In: OOPSLA (1999)
-
Igarashi, A., Pierce, B., Wadler, P.: Featherweight Java: A minimal core calculus for Java and GJ. In: OOPSLA (1999)
-
-
-
-
35
-
-
0032785166
-
Is the Java type system sound?
-
Drossopoulou, S., Eisenbach, S., Khurshid, S.: Is the Java type system sound? Theory and Practice of Object Systems 5(11), 3-24 (1999)
-
(1999)
Theory and Practice of Object Systems
, vol.5
, Issue.11
, pp. 3-24
-
-
Drossopoulou, S.1
Eisenbach, S.2
Khurshid, S.3
-
36
-
-
0345884636
-
Making the future safe for the past: Adding genericity to the Java programming language
-
Bracha, G., Odersky, M., Stoutamire, D., Wadler, P.: Making the future safe for the past: Adding genericity to the Java programming language. In: OOPSLA, pp. 183-200 (1998)
-
(1998)
OOPSLA
, pp. 183-200
-
-
Bracha, G.1
Odersky, M.2
Stoutamire, D.3
Wadler, P.4
-
39
-
-
0029192639
-
-
Cardelli, L.: A language with distributed scope. In: POPL, pp. 286-297. ACM Press, New York (1995)
-
Cardelli, L.: A language with distributed scope. In: POPL, pp. 286-297. ACM Press, New York (1995)
-
-
-
-
41
-
-
0038460668
-
Process algebras with localities
-
North-Holland, pp
-
Castellani, I.: Process algebras with localities. In: Handbook of Process Algebra, North-Holland, pp. 945-1045 (2001)
-
(2001)
Handbook of Process Algebra
, pp. 945-1045
-
-
Castellani, I.1
-
42
-
-
0004189634
-
-
Addison-Wesley, Reading
-
Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns. Addison-Wesley, Reading (1995)
-
(1995)
Design Patterns
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
|