-
1
-
-
33750110668
-
Toward pervasive computing
-
ISSN 1536-1268
-
J, Bacon. Toward pervasive computing. IEEE Pervasive Camp. Magazine, 1(2):84, 2002. ISSN 1536-1268.
-
(2002)
IEEE Pervasive Camp. Magazine
, vol.1
, Issue.2
, pp. 84
-
-
Bacon, J.1
-
4
-
-
49049117172
-
-
N. Bielova, M. Dalla Torre, N. Dragoni, and 1. Siahaan. Matching policies with security claims of mobile applications. In Proc. of the 3rd Int. Conf. on Availability, Reliability and Security (ARES'08). IEEE Press, 2008.
-
N. Bielova, M. Dalla Torre, N. Dragoni, and 1. Siahaan. Matching policies with security claims of mobile applications. In Proc. of the 3rd Int. Conf. on Availability, Reliability and Security (ARES'08). IEEE Press, 2008.
-
-
-
-
5
-
-
26444487547
-
Efficient satisfiability modulo theories via delayed theory combination
-
K. Etessami and S.K. Rajamani, editors, Proc. cf CAV'05, of, Springer-Verlag
-
M. Bozzano, R. Bruttornesso, A. Cirnatti, T. Junttila, S. Ranise, Rv. Rossum, and R. Sebastiani. Efficient satisfiability modulo theories via delayed theory combination. In K. Etessami and S.K. Rajamani, editors, Proc. cf CAV'05, volume 3576 of LNCS, pages 335-349. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3576
, pp. 335-349
-
-
Bozzano, M.1
Bruttornesso, R.2
Cirnatti, A.3
Junttila, T.4
Ranise, S.5
Rossum, R.6
Sebastiani, R.7
-
6
-
-
0002921593
-
On a decision method in restricted second-order arithmetic
-
E. Nagel et al, editor, Stanford University Press
-
J.R. Büchi, On a decision method in restricted second-order arithmetic. In E. Nagel et al., editor, Int. Cong, on Logic, Methodology and Philosophy of Science, pages 1-11. Stanford University Press, 1962.
-
(1962)
Int. Cong, on Logic, Methodology and Philosophy of Science
, pp. 1-11
-
-
Büchi, J.R.1
-
7
-
-
49049106661
-
Security-by- Contract: Toward a Semantics for Digital Signatures on Mobile Code
-
Springer-Verlag
-
N. Dragoni, F. Massacci, K. Naliuka, and I. Siahaan. Security-by- Contract: Toward a Semantics for Digital Signatures on Mobile Code. In Proc. of EuroPKI'07. Springer-Verlag, 2007a.
-
(2007)
Proc. of EuroPKI'07
-
-
Dragoni, N.1
Massacci, F.2
Naliuka, K.3
Siahaan, I.4
-
8
-
-
47649093926
-
A security-by-contracts architecture for pervasive services
-
IEEE Press
-
N. Dragoni, F. Massacci, C. Schaefer, T. Walter, and E. Vetillard. A security-by-contracts architecture for pervasive services. In Proc. of the 3rd Int. Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing. IEEE Press, 2007b.
-
(2007)
Proc. of the 3rd Int. Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing
-
-
Dragoni, N.1
Massacci, F.2
Schaefer, C.3
Walter, T.4
Vetillard, E.5
-
9
-
-
24944483574
-
The Inlined Reference Monitor Approach to Security Policy Enforcement
-
Technical report 2003-1916, Department of Computer Science, Cornell University
-
U. Erlingsson. The Inlined Reference Monitor Approach to Security Policy Enforcement. Technical report 2003-1916, Department of Computer Science, Cornell University, 2003.
-
(2003)
-
-
Erlingsson, U.1
-
10
-
-
0033724116
-
-
U. Erlingsson and F.B. Schneider, lrm enforcement of Java stack inspection. In Proc. of Symp. on Sec. and Privacy, page 246. IEEE Press, 2000. ISBN 0-7695-0665-8.
-
U. Erlingsson and F.B. Schneider, lrm enforcement of Java stack inspection. In Proc. of Symp. on Sec. and Privacy, page 246. IEEE Press, 2000. ISBN 0-7695-0665-8.
-
-
-
-
11
-
-
27144454045
-
-
K. Etessami, T. Wilke, and R. Schuller. Fair simulation relations, parity games, and state space reduction for büchi automata. SIAM J. on Comp., 34(5):1159-1175, 2005. ISSN 0097-5397.
-
K. Etessami, T. Wilke, and R. Schuller. Fair simulation relations, parity games, and state space reduction for büchi automata. SIAM J. on Comp., 34(5):1159-1175, 2005. ISSN 0097-5397.
-
-
-
-
12
-
-
84937561488
-
Fair simulation minimization
-
Springer-Verlag, ISBN 3-540-43997-8
-
S. Gurumurthy, R. Bloem, and F. Somenzi. Fair simulation minimization. In Proc. of CAV'02, pages 610-624. Springer-Verlag, 2002. ISBN 3-540-43997-8.
-
(2002)
Proc. of CAV'02
, pp. 610-624
-
-
Gurumurthy, S.1
Bloem, R.2
Somenzi, F.3
-
13
-
-
33745939678
-
Certified in-lined reference monitoring on .net
-
ACM Press
-
K.W. Hamlen, G. Morrisett, and F.B. Schneider. Certified in-lined reference monitoring on .net. In Proc. of the 2006 workshop on Prog. Lang, and analysis for security, pages 7-16. ACM Press, 2006.
-
(2006)
Proc. of the 2006 workshop on Prog. Lang, and analysis for security
, pp. 7-16
-
-
Hamlen, K.W.1
Morrisett, G.2
Schneider, F.B.3
-
22
-
-
33847102258
-
Solving SAT and SAT Modulo Theories: From an Abstract Davis-Putnam-Logemann-Loveland Procedure to DPLL(T)
-
R. Nieuwenhuis, A. Oliveras, and C. Tinelli. Solving SAT and SAT Modulo Theories: from an Abstract Davis-Putnam-Logemann-Loveland Procedure to DPLL(T). J. of the ACM, 53(6):937-977, 2006.
-
(2006)
J. of the ACM
, vol.53
, Issue.6
, pp. 937-977
-
-
Nieuwenhuis, R.1
Oliveras, A.2
Tinelli, C.3
-
24
-
-
84881225236
-
Enforceable security policies
-
FB. Schneider. Enforceable security policies. TISSEC, 3(l):30-50, 2000.
-
(2000)
TISSEC
, vol.3
, Issue.L
, pp. 30-50
-
-
Schneider, F.B.1
-
26
-
-
21644444136
-
Model-carrying code: A practical approach for safe execution of untrusted applications
-
ACM Press, ISBN 1-58113-757-5
-
R. Sekar, V.N. Venkatakrishnan, S. Basu, S. Bhatkar, and D.C. DuVar-ney. Model-carrying code: a practical approach for safe execution of untrusted applications. In Proc. of the 19th ACM Symp. on Operating Sys. Princ., pages 15-28. ACM Press, 2003. ISBN 1-58113-757-5.
-
(2003)
Proc. of the 19th ACM Symp. on Operating Sys. Princ
, pp. 15-28
-
-
Sekar, R.1
Venkatakrishnan, V.N.2
Basu, S.3
Bhatkar, S.4
DuVar-ney, D.C.5
-
27
-
-
57349141123
-
A flexible security architecture to support third-party applications on mobile devices
-
D. Vanoverberghe, P. Philippaerts, L. Desmet, W. Joosen, F. Piessens, K. Naliuka, and F. Massacci. A flexible security architecture to support third-party applications on mobile devices. In Proc. of the 1st ACM Comp. Sec. Arch. Workshop, 2007.
-
(2007)
Proc. of the 1st ACM Comp. Sec. Arch. Workshop
-
-
Vanoverberghe, D.1
Philippaerts, P.2
Desmet, L.3
Joosen, W.4
Piessens, F.5
Naliuka, K.6
Massacci, F.7
-
30
-
-
84982946701
-
A sanctuary for mobile agents
-
J. Vitek and CD. Jensen, editors, Springer-Verlag
-
B.S. Yee. A sanctuary for mobile agents. In J. Vitek and CD. Jensen, editors, Secure Internet Programming, pages 261-273. Springer-Verlag, 1999.
-
(1999)
Secure Internet Programming
, pp. 261-273
-
-
Yee, B.S.1
|