-
5
-
-
0023558367
-
Recognizing safety and liveness
-
ALPERN, B. AND SCHNEIDER, F. B. 1987. Recognizing safety and liveness. Distrib. Comput. 2, 117-126.
-
(1987)
Distrib. Comput
, vol.2
, pp. 117-126
-
-
ALPERN, B.1
SCHNEIDER, F.B.2
-
6
-
-
14844332191
-
More enforceable security policies
-
Copenhagen, Denmark
-
BAUER, L., LIGATTI, J., AND WALKER, D. 2002. More enforceable security policies. In Proceedings of the Annual Symposium on Foundations of Computer Security (FOCS'02). Copenhagen, Denmark.
-
(2002)
Proceedings of the Annual Symposium on Foundations of Computer Security (FOCS'02)
-
-
BAUER, L.1
LIGATTI, J.2
WALKER, D.3
-
7
-
-
35248842056
-
-
BAUER, L., LIGATTI, J., AND WALKER, D. 2003. Types and effects for non-interfering program monitors. In Proceedings of the Software Security-Theories and Systems. Mext-NSF-JSPS International Symposium, (ISSS'02). Tokyo, Japan, Revised Papers, M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, Eds. Lecture Notes in Computer Science, 2609. Springer.
-
BAUER, L., LIGATTI, J., AND WALKER, D. 2003. Types and effects for non-interfering program monitors. In Proceedings of the Software Security-Theories and Systems. Mext-NSF-JSPS International Symposium, (ISSS'02). Tokyo, Japan, Revised Papers, M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, Eds. Lecture Notes in Computer Science, vol. 2609. Springer.
-
-
-
-
10
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Tech. rep. ESD-TR-76-372, MITRE Corporation
-
BIBA, K. J. 1975. Integrity considerations for secure computer systems. Tech. rep. ESD-TR-76-372, MITRE Corporation.
-
(1975)
-
-
BIBA, K.J.1
-
11
-
-
85025424440
-
An algebra for composing access control policies
-
BONATTI, P., DI VIMEECATI, S. D. C., AND SAMARATI, P. 2002. An algebra for composing access control policies. ACM Trans. Inform. Syst. Secur. 5, 1, 1-35.
-
(2002)
ACM Trans. Inform. Syst. Secur
, vol.5
, Issue.1
, pp. 1-35
-
-
BONATTI, P.1
DI VIMEECATI, S.D.C.2
SAMARATI, P.3
-
14
-
-
84944048132
-
The Ponder policy specification language
-
DAMIANOU, N., DULAY, N., LUPU, E., AND SLOMAN, M. 2001. The Ponder policy specification language. Lecture Notes in Computer Science, vol. 1995, 18-39.
-
(2001)
Lecture Notes in Computer Science
, vol.1995
, pp. 18-39
-
-
DAMIANOU, N.1
DULAY, N.2
LUPU, E.3
SLOMAN, M.4
-
20
-
-
38349043294
-
-
Ph.D. thesis, Massachusetts Institute of Technology
-
EVANS, D. 2000. Policy-directed code safety. Ph.D. thesis, Massachusetts Institute of Technology.
-
(2000)
Policy-directed code safety
-
-
EVANS, D.1
-
23
-
-
60349088604
-
-
Security policy enforcement by automated program-rewriting. Ph.D. thesis, Cornell University
-
HAMLEN, K. 2006. Security policy enforcement by automated program-rewriting. Ph.D. thesis, Cornell University.
-
(2006)
-
-
HAMLEN, K.1
-
24
-
-
33745329295
-
Computability classes for enforcement mechanisms
-
HAMLEN, K., MOEEISETT, G., AND SCHNEIDER, F. B. 2006a. Computability classes for enforcement mechanisms. ACM Trans. Progam. Lang. Syst. 28, 1, 175-205.
-
(2006)
ACM Trans. Progam. Lang. Syst
, vol.28
, Issue.1
, pp. 175-205
-
-
HAMLEN, K.1
MOEEISETT, G.2
SCHNEIDER, F.B.3
-
26
-
-
31844442209
-
Composable memory transactions
-
HAEEIS, T., MAELOW, S., JONES, S. L. P., AND HEELIHY, M. 2005. Composable memory transactions. In Proceedings of the ACM Symposium on Principles & Practice of Parallel Programming (PPoPP'05). 48-60.
-
(2005)
Proceedings of the ACM Symposium on Principles & Practice of Parallel Programming (PPoPP'05)
, pp. 48-60
-
-
HAEEIS, T.1
MAELOW, S.2
JONES, S.L.P.3
HEELIHY, M.4
-
27
-
-
84896694020
-
-
HAVELUND, K. AND ROŞU, G. 2004. Efficient monitoring of safety properties. Int. J. Softw. Tools Technol. Trans. 6, 2, 158-173.
-
HAVELUND, K. AND ROŞU, G. 2004. Efficient monitoring of safety properties. Int. J. Softw. Tools Technol. Trans. 6, 2, 158-173.
-
-
-
-
28
-
-
0031618223
-
A lightweight architecture for program execution monitoring
-
ACM Press
-
JEFFERY, C., ZHOU, W., TEMPLER, K., AND BEAZELL, M. 1998. A lightweight architecture for program execution monitoring. In Proceedings of the Program Analysis for Software Tools and Engineering. ACM Press, 67-74.
-
(1998)
Proceedings of the Program Analysis for Software Tools and Engineering
, pp. 67-74
-
-
JEFFERY, C.1
ZHOU, W.2
TEMPLER, K.3
BEAZELL, M.4
-
29
-
-
33646040896
-
Computational analysis of run-time monitoring-fundamentals of Java-MaC
-
KIM, M., KANNAN, S., LEE, I., SOKOLSKY, O., AND VISWANTATHAN, M. 2002. Computational analysis of run-time monitoring-fundamentals of Java-MaC. In Proceedings of the 2nd International Workshop on Runtime Verification (RV'02).
-
(2002)
Proceedings of the 2nd International Workshop on Runtime Verification (RV'02)
-
-
KIM, M.1
KANNAN, S.2
LEE, I.3
SOKOLSKY, O.4
VISWANTATHAN, M.5
-
30
-
-
60349112980
-
Formally specified monitoring of temporal properties
-
KIM, M., VISWANATHAN, M., BEN-A BDALLAH, H., KANNAN, S., LEE, I., AND SOKOLSKY, O. 1999. Formally specified monitoring of temporal properties. In Proceedings of the 11th Euromicro Conference on Real-Time Systems (ECRTS'99).
-
(1999)
Proceedings of the 11th Euromicro Conference on Real-Time Systems (ECRTS'99)
-
-
KIM, M.1
VISWANATHAN, M.2
BEN-A3
BDALLAH, H.4
KANNAN, S.5
LEE, I.6
SOKOLSKY, O.7
-
31
-
-
0017472779
-
Proving the correctness of multiprocess programs
-
LAMPOET, L. 1977. Proving the correctness of multiprocess programs. IEEE Trans. Softw. Engin. 3, 2, 125-143.
-
(1977)
IEEE Trans. Softw. Engin
, vol.3
, Issue.2
, pp. 125-143
-
-
LAMPOET, L.1
-
32
-
-
0026943147
-
A specificational approach to high level program monitoring and measuring
-
LIAO, Y. AND COHEND. 1992. A specificational approach to high level program monitoring and measuring. IEEE Trans. Softw. Engin. 18, 11, 969-978.
-
(1992)
IEEE Trans. Softw. Engin
, vol.18
, Issue.11
, pp. 969-978
-
-
LIAO, Y.1
COHEND2
-
33
-
-
60349129736
-
-
Policy enforcement via program monitoring. Ph.D. thesis, Princeton University
-
LIGATTI, J. 2006. Policy enforcement via program monitoring. Ph.D. thesis, Princeton University.
-
(2006)
-
-
LIGATTI, J.1
-
34
-
-
33646064059
-
Edit automata: Enforcement mechanisms for run-time security policies
-
Tech. rep. TR-681-03, Princeton University
-
LIGATTI, J., BAUER, L., AND WALKER, D. 2003. Edit automata: Enforcement mechanisms for run-time security policies. Tech. rep. TR-681-03, Princeton University.
-
(2003)
-
-
LIGATTI, J.1
BAUER, L.2
WALKER, D.3
-
35
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
LIGATTI, J., BAUER, L., AND WALKER, D. 2005a. Edit automata: Enforcement mechanisms for run-time security policies. Int. J. Inform. Secur. 4, 1-2, 2-16.
-
(2005)
Int. J. Inform. Secur
, vol.4
, Issue.1-2
, pp. 2-16
-
-
LIGATTI, J.1
BAUER, L.2
WALKER, D.3
-
39
-
-
33846587542
-
An approach for the specification, verification and synthesis of secure systems
-
MAETINELLI, F. AND MATTEUCCI, I. 2007a. An approach for the specification, verification and synthesis of secure systems. Electron. Notes Theor. Comput. Sci. 168, 29-43.
-
(2007)
Electron. Notes Theor. Comput. Sci
, vol.168
, pp. 29-43
-
-
MAETINELLI, F.1
MATTEUCCI, I.2
-
43
-
-
34347249528
-
Automated synthesis of enforcing mechanisms for security properties in a timed setting
-
MATTEUCCI, I. 2007. Automated synthesis of enforcing mechanisms for security properties in a timed setting. Electron. Notes Theor. Comput. Sci. 186, 101-120.
-
(2007)
Electron. Notes Theor. Comput. Sci
, vol.186
, pp. 101-120
-
-
MATTEUCCI, I.1
-
44
-
-
0002426876
-
A general theory of composition for a class of possibilistic properties
-
MCLEAN, J. 1996. A general theory of composition for a class of possibilistic properties. IEEE Trans. Softw. Engin. 22, 1, 53-67.
-
(1996)
IEEE Trans. Softw. Engin
, vol.22
, Issue.1
, pp. 53-67
-
-
MCLEAN, J.1
-
45
-
-
84918597829
-
Synthesis of communicating behaviour
-
Mathematical Foundations of Computer Science
-
MILNER, R. 1978. Synthesis of communicating behaviour. In Mathematical Foundations of Computer Science. Lecture Notes in Computer Science, vol. 64. 71-83.
-
(1978)
Lecture Notes in Computer Science
, vol.64
, pp. 71-83
-
-
MILNER, R.1
-
46
-
-
0018708023
-
-
@PAXTON, W. H. 1979. A client-based transaction system to maintain data integrity. In Proceedings of the 7th ACM Symposium on Operating Systems Principles (OSP'79). ACM Press, 18-23.
-
@PAXTON, W. H. 1979. A client-based transaction system to maintain data integrity. In Proceedings of the 7th ACM Symposium on Operating Systems Principles (OSP'79). ACM Press, 18-23.
-
-
-
-
48
-
-
60349091144
-
Decomposing properties into safety and liveness using predicate logic
-
87-874, Cornell University
-
SCHNEIDER, F. B. 1987. Decomposing properties into safety and liveness using predicate logic. Tech. rep. TR 87-874, Cornell University.
-
(1987)
Tech. rep. TR
-
-
SCHNEIDER, F.B.1
-
50
-
-
4644288597
-
Efficient decentralized monitoring of safety in distributed systems
-
SEN, K., VARDHAN, A., AGHA, G., AND ROSU, G. 2004. Efficient decentralized monitoring of safety in distributed systems. In Proceedings of the 26th International Conference on Software Engineering (ICSE'04). 418-427.
-
(2004)
Proceedings of the 26th International Conference on Software Engineering (ICSE'04)
, pp. 418-427
-
-
SEN, K.1
VARDHAN, A.2
AGHA, G.3
ROSU, G.4
-
53
-
-
0027836576
-
Efficient software-based fault isolation
-
WAHBE, R., LUCCO, S., ANDERSON, T., AND GRAHAM, S. 1993. Efficient software-based fault isolation. In Proceedings of the 14th ACM Symposium on Operating Systems Principles (OSP'93). 203-216.
-
(1993)
Proceedings of the 14th ACM Symposium on Operating Systems Principles (OSP'93)
, pp. 203-216
-
-
WAHBE, R.1
LUCCO, S.2
ANDERSON, T.3
GRAHAM, S.4
-
55
-
-
33846497980
-
JavaScript instrumentation for browser security
-
YU, D., CHANDER, A., ISLAM, N., AND SERIKOV, I. 2007. JavaScript instrumentation for browser security. In Proceedings of the 34th annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (SIGACT'07). 237-249.
-
(2007)
Proceedings of the 34th annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (SIGACT'07)
, pp. 237-249
-
-
YU, D.1
CHANDER, A.2
ISLAM, N.3
SERIKOV, I.4
|