-
1
-
-
33745261574
-
Optimising aspectj
-
New York, NY, USA, ACM Press
-
P. Avgustinov, A. S. Christensen, L. Hendren, S. Kuzins, J. Lhoták, O. Lhoták, O. de Moor, D. Sereni, G. Sittampalam, and J. Tibble. Optimising aspectj. In PLDI '05: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, pages 117-128, New York, NY, USA, 2005. ACM Press.
-
(2005)
PLDI '05: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 117-128
-
-
Avgustinov, P.1
Christensen, A.S.2
Hendren, L.3
Kuzins, S.4
Lhoták, J.5
Lhoták, O.6
De Moor, O.7
Sereni, D.8
Sittampalam, G.9
Tibble, J.10
-
2
-
-
38049178772
-
Tom: Piggybacking rewriting on java
-
of Lecture Notes in Computer Science, Springer-Verlag
-
E. Balland, P. Brauner, R. Kopetz, P.-E. Moreau, and A. Reilles. Tom: Piggybacking rewriting on java. In Proceedings of the 18th Conference on Rewriting Techniques and Applications, volume 4533 of Lecture Notes in Computer Science, pages 36-47. Springer-Verlag, 2007.
-
(2007)
Proceedings of the 18th Conference on Rewriting Techniques and Applications
, vol.4533
, pp. 36-47
-
-
Balland, E.1
Brauner, P.2
Kopetz, R.3
Moreau, P.-E.4
Reilles, A.5
-
3
-
-
33746070058
-
Formal islands
-
M. Johnson and V. Vene, editors, of Lecture Notes in Computer Science, Springer-Verlag, July
-
E. Balland, C. Kirchner, and P.-E. Moreau. Formal Islands. In M. Johnson and V. Vene, editors, AMAST, Kuressaare (Estonia), volume 4019 of Lecture Notes in Computer Science, pages 51-65. Springer-Verlag, July 2006.
-
(2006)
AMAST, Kuressaare (Estonia)
, vol.4019
, pp. 51-65
-
-
Balland, E.1
Kirchner, C.2
Moreau, P.-E.3
-
4
-
-
84859750621
-
Optimizing pattern matching compilation by program transformation
-
J.-M. Favre, R. Heckel, and T. Mens, editors, Electronic Communications of EASST, To appear
-
E. Balland and P.-E. Moreau. Optimizing pattern matching compilation by program transformation. In J.-M. Favre, R. Heckel, and T. Mens, editors, 3rd Workshop on Software Evolution through Transformations (SeTra'06). Electronic Communications of EASST, 2006. To appear.
-
(2006)
3rd Workshop on Software Evolution Through Transformations (SeTra'06)
-
-
Balland, E.1
Moreau, P.-E.2
-
5
-
-
33746684330
-
Term rewriting for access control
-
E. Damiani and P. Liu, editors, of Lecture Notes in Computer Science, Springer
-
S. Barker and M. Fernández. Term rewriting for access control. In E. Damiani and P. Liu, editors, DBSec, volume 4127 of Lecture Notes in Computer Science, pages 179-193. Springer, 2006.
-
(2006)
DBSec
, vol.4127
, pp. 179-193
-
-
Barker, S.1
Fernández, M.2
-
6
-
-
31844457357
-
Composing security policies with polymer
-
New York, NY, USA, ACM Press
-
L. Bauer, J. Ligatti, and D. Walker. Composing security policies with polymer. In PLDI '05: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, pages 305-314, New York, NY, USA, 2005. ACM Press.
-
(2005)
PLDI '05: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 305-314
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
7
-
-
33646036095
-
-
Deliverable I2/D1, REWERSE
-
P. A. Bonatti, N. Shahmehri, C. Duma, D. Olmedilla, W. Nejdl, M. Baldoni, C. Baroglio, A. Martelli, V. Patti, P. Coraggio, G. Antoniou, J. Peer, and N. E. Fuchs. Rule-based policy specification: State of the art and future work. Deliverable I2/D1, REWERSE, 2004.
-
(2004)
Rule-based Policy Specification: State of the Art and Future Work
-
-
Bonatti, P.A.1
Shahmehri, N.2
Duma, C.3
Olmedilla, D.4
Nejdl, W.5
Baldoni, M.6
Baroglio, C.7
Martelli, A.8
Patti, V.9
Coraggio, P.10
Antoniou, G.11
Peer, J.12
Fuchs, N.E.13
-
8
-
-
33750959395
-
Availability enforcement by obligations and aspects identification
-
IEEE Computer Society
-
F. Cuppens, N. Cuppens-Boulahia, and T. Ramard. Availability enforcement by obligations and aspects identification. In ARES, pages 229-239. IEEE Computer Society, 2006.
-
(2006)
ARES
, pp. 229-239
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Ramard, T.3
-
9
-
-
24644431553
-
Policies, models, and languages for access control
-
S. Bhalla, editor, of Lecture Notes in Computer Science, Springer
-
S. D. C. di Vimercati, P. Samarati, and S. Jajodia. Policies, models, and languages for access control. In S. Bhalla, editor, DNIS, volume 3433 of Lecture Notes in Computer Science, pages 225-237. Springer, 2005.
-
(2005)
DNIS
, vol.3433
, pp. 225-237
-
-
Di Vimercati, S.D.C.1
Samarati, P.2
Jajodia, S.3
-
10
-
-
33749558954
-
Specifying and reasoning about dynamic access-control policies
-
U. Furbach and N. Shankar, editors, of Lecture Notes in Computer Science, Springer
-
D. J. Dougherty, K. Fisler, and S. Krishnamurthi. Specifying and reasoning about dynamic access-control policies. In U. Furbach and N. Shankar, editors, IJCAR, volume 4130 of Lecture Notes in Computer Science, pages 632-646. Springer, 2006.
-
(2006)
IJCAR
, vol.4130
, pp. 632-646
-
-
Dougherty, D.J.1
Fisler, K.2
Krishnamurthi, S.3
-
11
-
-
38049036409
-
Modular access control via strategic rewriting
-
of Lecture Notes in Computer Science, Springer
-
D. J. Dougherty, C. Kirchner, H. Kirchner, and A. Santana de Oliveira. Modular access control via strategic rewriting. ESORICS, volume 4734 of Lecture Notes in Computer Science, pages 578-593. Springer, 2007.
-
(2007)
ESORICS
, vol.4734
, pp. 578-593
-
-
Dougherty, D.J.1
Kirchner, C.2
Kirchner, H.3
De Oliveira, A.S.4
-
12
-
-
0033489650
-
Sasi enforcement of security policies: A retrospective
-
New York, NY, USA, ACM Press
-
U. Erlingsson and F. B. Schneider. Sasi enforcement of security policies: a retrospective. In NSPW '99: Proceedings of the 1999 workshop on New security paradigms, pages 87-95, New York, NY, USA, 2000. ACM Press.
-
(2000)
NSPW '99: Proceedings of the 1999 Workshop on New Security Paradigms
, pp. 87-95
-
-
Erlingsson, U.1
Schneider, F.B.2
-
14
-
-
35048887144
-
Automated termination proofs with AProVE
-
V. van Oostrom, editor, of Lecture Notes in Computer Science, Springer
-
J. Giesl, R. Thiemann, P. Schneider-Kamp, and S. Falke. Automated termination proofs with AProVE. In V. van Oostrom, editor, RTA, volume 3091 of Lecture Notes in Computer Science, pages 210-220. Springer, 2004.
-
(2004)
RTA
, vol.3091
, pp. 210-220
-
-
Giesl, J.1
Thiemann, R.2
Schneider-Kamp, P.3
Falke, S.4
-
16
-
-
0001619596
-
Flexible support for multiple access control policies
-
S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian. Flexible support for multiple access control policies. ACM Trans. Database Syst., 26 (2):214-260, 2001.
-
(2001)
ACM Trans. Database Syst.
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
17
-
-
77952407814
-
Organization based access control policies for distributed systems and networks, 2003
-
A. Kalam, R. Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miege, C. Saurel, and G. Trouessin. Organization based access control. Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop on, pages 120-131, 2003.
-
(2003)
Proceedings. POLICY 2003. IEEE 4th International Workshop on
, pp. 120-131
-
-
Kalam, A.1
Baida, R.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miege, A.7
Saurel, C.8
Trouessin, G.9
-
18
-
-
82955230066
-
An overview of aspectj
-
J. L. Knudsen, editor, of Lecture Notes in Computer Science, Springer
-
G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W. G. Griswold. An overview of aspectj. In J. L. Knudsen, editor, ECOOP, volume 2072 of Lecture Notes in Computer Science, pages 327-353. Springer, 2001.
-
(2001)
ECOOP
, vol.2072
, pp. 327-353
-
-
Kiczales, G.1
Hilsdale, E.2
Hugunin, J.3
Kersten, M.4
Palm, J.5
Griswold, W.G.6
-
19
-
-
35248828504
-
Aspect-oriented programming
-
G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. V. Lopes, J.-M. Loingtier, and J. Irwin. Aspect-oriented programming. In ECOOP, pages 220-242, 1997.
-
(1997)
ECOOP
, pp. 220-242
-
-
Kiczales, G.1
Lamping, J.2
Mendhekar, A.3
Maeda, C.4
Lopes, C.V.5
Loingtier, J.-M.6
Irwin, J.7
-
20
-
-
33746051723
-
Formal validation of pattern matching code
-
P. Barahona and A. P. Felty, editors, ACM
-
C. Kirchner, P.-E. Moreau, and A. Reilles. Formal validation of pattern matching code. In P. Barahona and A. P. Felty, editors, PPDP, pages 187-197. ACM, 2005.
-
(2005)
PPDP
, pp. 187-197
-
-
Kirchner, C.1
Moreau, P.-E.2
Reilles, A.3
-
22
-
-
33646066871
-
Enforcing non-safety security policies with program monitors
-
S. D. C. di Vimercati, P. F. Syverson, and D. Gollmann, editors, of Lecture Notes in Computer Science, Springer
-
J. Ligatti, L. Bauer, and D. Walker. Enforcing non-safety security policies with program monitors. In S. D. C. di Vimercati, P. F. Syverson, and D. Gollmann, editors, ESORICS, volume 3679 of Lecture Notes in Computer Science, pages 355-373. Springer, 2005.
-
(2005)
ESORICS
, vol.3679
, pp. 355-373
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
23
-
-
77952401014
-
Automated detection of information leakage in access control
-
M. Nesi and R. Treinen, editors, Paris, France, July
-
C. Morisset and A. Santana de Oliveira. Automated detection of information leakage in access control. In M. Nesi and R. Treinen, editors, Preliminary Proceedings of the 2nd International Workshop on Security and Rewriting Techniques (SecReT'07), Paris, France, July 2007.
-
(2007)
Preliminary Proceedings of the 2nd International Workshop on Security and Rewriting Techniques (SecReT'07)
-
-
Morisset, C.1
De Oliveira, A.S.2
-
25
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. Computer, 29 (2):38-47, 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
27
-
-
84881225236
-
Enforceable security policies
-
F. B. Schneider. Enforceable security policies. ACM Trans. Inf. Syst. Secur., 3 (1):30-50, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
28
-
-
30644467106
-
Verifiable composition of access control and application features
-
E. Ferrari and G.-J. Ahn, editors, ACM
-
E. Song, R. Reddy, R. B. France, I. Ray, G. Georg, and R. Alexander. Verifiable composition of access control and application features. In E. Ferrari and G.-J. Ahn, editors, SACMAT, pages 120-129. ACM, 2005.
-
(2005)
SACMAT
, pp. 120-129
-
-
Song, E.1
Reddy, R.2
France, R.B.3
Ray, I.4
Georg, G.5
Alexander, R.6
|