메뉴 건너뛰기




Volumn , Issue , 2007, Pages 27-36

Barrier slicing for remote software trusting

Author keywords

[No Author keywords available]

Indexed keywords

BACKWARD SLICES; CASE STUDIES; CLIENT CODES; FORMAL DEFINITIONS; NETWORK CONNECTIONS;

EID: 47749090850     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SCAM.2007.27     Document Type: Conference Paper
Times cited : (28)

References (13)
  • 4
    • 4444306353 scopus 로고    scopus 로고
    • Slicing, chopping, and path conditions with barriers
    • dec
    • J. Krinke. Slicing, chopping, and path conditions with barriers. Software Quality Journal, 12(4):339-360, dec 2004.
    • (2004) Software Quality Journal , vol.12 , Issue.4 , pp. 339-360
    • Krinke, J.1
  • 5
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: theory and practice. ACM Trans. Comput. Syst., 10(4):265-310, 1992.
    • (1992) ACM Trans. Comput. Syst , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 6
    • 47749129803 scopus 로고    scopus 로고
    • D. of Defense. Trusted computer security evaluation criteria. Washington D.C., December 1985. DOD 5200.28-STD.
    • D. of Defense. Trusted computer security evaluation criteria. Washington D.C., December 1985. DOD 5200.28-STD.
  • 10
    • 47749110027 scopus 로고    scopus 로고
    • M. C. Umesh Shankar and J. D. Tygar. Side effects are not sufficient to authenticate software. Technical Report UCB/CSD-04-1363, EECS Department, University of California, Berkeley, 2004.
    • M. C. Umesh Shankar and J. D. Tygar. Side effects are not sufficient to authenticate software. Technical Report UCB/CSD-04-1363, EECS Department, University of California, Berkeley, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.