-
1
-
-
38049178772
-
Tom: Piggybacking rewriting on java
-
Proceedings of the 18th Conference on Rewriting Techniques and Applications, Springer-Verlag
-
Balland E., Brauner P., Kopetz R., Moreau P.-E., and Reilles A. Tom: Piggybacking rewriting on java. Proceedings of the 18th Conference on Rewriting Techniques and Applications. Lecture Notes in Computer Science volume 4533 (2007), Springer-Verlag 36-47
-
(2007)
Lecture Notes in Computer Science
, vol.4533
, pp. 36-47
-
-
Balland, E.1
Brauner, P.2
Kopetz, R.3
Moreau, P.-E.4
Reilles, A.5
-
2
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
ESD-TR-73-278 I-III, Mitre Corporation
-
D.E. Bell and L.J. LaPadula. Secure computer systems: Mathematical foundations. Technical Report Mitre Report ESD-TR-73-278 (Vol. I-III), Mitre Corporation, 1974
-
(1974)
Technical Report Mitre Report
-
-
Bell, D.E.1
LaPadula, L.J.2
-
3
-
-
49049100147
-
Secure computer systems: A mathematical model, volume II
-
Elliot Bell D., and LaPadula L.J. Secure computer systems: A mathematical model, volume II. Journal of Computer Security 4 2/3 (1996) 229-263
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 229-263
-
-
Elliot Bell, D.1
LaPadula, L.J.2
-
4
-
-
33749558954
-
Specifying and reasoning about dynamic access-control policies
-
IJCAR. Furbach U., and Shankar N. (Eds), Springer
-
Dougherty D.J., Fisler K., and Krishnamurthi S. Specifying and reasoning about dynamic access-control policies. In: Furbach U., and Shankar N. (Eds). IJCAR. Lecture Notes in Computer Science volume 4130 (2006), Springer 632-646
-
(2006)
Lecture Notes in Computer Science
, vol.4130
, pp. 632-646
-
-
Dougherty, D.J.1
Fisler, K.2
Krishnamurthi, S.3
-
5
-
-
35048849152
-
Model-checking access control policies
-
ISC. Zhang K., and Zheng Y. (Eds), Springer
-
Guelev D.P., Ryan M., and Schobbens P.-Y. Model-checking access control policies. In: Zhang K., and Zheng Y. (Eds). ISC. Lecture Notes in Computer Science volume 3225 (2004), Springer 219-230
-
(2004)
Lecture Notes in Computer Science
, vol.3225
, pp. 219-230
-
-
Guelev, D.P.1
Ryan, M.2
Schobbens, P.-Y.3
-
6
-
-
0031701347
-
The SLam calculus: Programming with secrecy and integrity
-
ACM (Ed). San Diego, California, 19-21 January 1998, ACM Press, New York, NY, USA
-
Heintze N., and Riecke J.G. The SLam calculus: Programming with secrecy and integrity. In: ACM (Ed). Conference record of POPL '98: the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. San Diego, California, 19-21 January 1998 (1998), ACM Press, New York, NY, USA 365-377
-
(1998)
Conference record of POPL '98: the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 365-377
-
-
Heintze, N.1
Riecke, J.G.2
-
9
-
-
62849124017
-
Automated detection of information leakage in access control
-
Monica Nesi and Ralf Treinen, editors, Paris, France
-
Charles Morisset and Anderson Santana de Oliveira. Automated detection of information leakage in access control. In Monica Nesi and Ralf Treinen, editors, Second International Workshop on Security and Rewriting Techniques - SecReT 2007, Paris, France, 2007
-
(2007)
Second International Workshop on Security and Rewriting Techniques - SecReT
-
-
Morisset, C.1
Santana de Oliveira, A.2
-
10
-
-
21144432063
-
A Pattern Matching Compiler for Multiple Target Languages
-
12th Conference on Compiler Construction. Hedin G. (Ed). Warsaw, Poland, Springer-Verlag
-
Moreau P.-E., Ringeissen C., and Vittek M. A Pattern Matching Compiler for Multiple Target Languages. In: Hedin G. (Ed). 12th Conference on Compiler Construction. Warsaw, Poland. LNCS volume 2622 (May 2003), Springer-Verlag 61-76
-
(2003)
LNCS
, vol.2622
, pp. 61-76
-
-
Moreau, P.-E.1
Ringeissen, C.2
Vittek, M.3
-
12
-
-
34547327908
-
NETRA: seeing through access control
-
Winslett M., Gordon A.D., and Sands D. (Eds), ACM
-
Naldurg P., Schwoon S., Rajamani S.K., and Lambert J. NETRA: seeing through access control. In: Winslett M., Gordon A.D., and Sands D. (Eds). FMSE (2006), ACM 55-66
-
(2006)
FMSE
, pp. 55-66
-
-
Naldurg, P.1
Schwoon, S.2
Rajamani, S.K.3
Lambert, J.4
-
13
-
-
34447618954
-
Canonical abstract syntax trees
-
Proceedings of WRLA 2006, Vienna, Austria. Denker G., and Talcott C. (Eds)
-
Reilles A. Canonical abstract syntax trees. In: Denker G., and Talcott C. (Eds). Proceedings of WRLA 2006, Vienna, Austria. Electronic Notes in Theoretical Computer Science 176 (2006) 165-179
-
(2006)
Electronic Notes in Theoretical Computer Science
, vol.176
, pp. 165-179
-
-
Reilles, A.1
-
14
-
-
0027699087
-
Lattice-based access control models
-
Sandhu R.S. Lattice-based access control models. IEEE Computer 26 11 (1993) 9-19
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
|