-
1
-
-
67650518579
-
-
Java-XML Tools Project
-
Java-XML Tools Project. http://www.jtool.org/.
-
-
-
-
2
-
-
67650560622
-
-
Jif: Java information flow
-
Jif: Java information flow. http://www.cs.cornell.edu/jif/.
-
-
-
-
3
-
-
0004072686
-
-
Addison-Wesley
-
A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley, 1986.
-
(1986)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A.V.1
Sethi, R.2
Ullman, J.D.3
-
5
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
15
-
-
0028514027
-
A taxonomy of computer program security flaws, with examples
-
C. E. Landwehr, A. R. Bull, J. P. McDermott, and W. S. Choi. A taxonomy of computer program security flaws, with examples. ACM Computing Surveys, 26(3):211-254, 1994.
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
19
-
-
0032646625
-
Jflow: Practical mostly-static information flow
-
January
-
A. C.Myers. Jflow: Practical mostly-static information flow. In Proc. POPL'99, pages 228-241, January 1999.
-
(1999)
Proc. POPL'99
, pp. 228-241
-
-
Myers, A.C.1
-
20
-
-
0003547217
-
-
2nd ed. Addison-Wesley
-
S. Oaks. Java Security, 2nd ed. Addison-Wesley, 2001.
-
(2001)
Java Security
-
-
Oaks, S.1
-
21
-
-
33751059718
-
JAAT: Java alias analysis tool for program maintenance activities
-
F.Ohata and K. Inoue. JAAT: Java alias analysis tool for program maintenance activities. In Proc. ISORC 2006, pages 232-244, 2006.
-
(2006)
Proc. ISORC 2006
, pp. 232-244
-
-
Ohata, F.1
Inoue, K.2
-
22
-
-
0003489758
-
Refactoring object-oriented frameworks
-
Ph.D. thesis, University of Illinois, Urbana-Champaign
-
W. F. Opdyke. Refactoring object-oriented frameworks. Technical report, Ph.D. thesis, University of Illinois, Urbana-Champaign, 1992.
-
(1992)
Technical report
-
-
Opdyke, W.F.1
-
24
-
-
33750050331
-
-
John Wiley & Sons
-
M. Schumacher, E. Fernandez-Buglioni, D. Hybertson, F. Buschmann, and P. Sommerlad. Security Patterns: Integrating Security And Systems Engineering. John Wiley & Sons, 2006.
-
(2006)
Security Patterns: Integrating Security And Systems Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
25
-
-
0002379404
-
Analysis of programs with exception-handling constructs
-
S. Sinha and M. J. Harrold. Analysis of programs with exception-handling constructs. In Proc. ICSM'98, pages 358-367, 1998.
-
(1998)
Proc. ICSM'98
, pp. 358-367
-
-
Sinha, S.1
Harrold, M.J.2
-
26
-
-
0034270432
-
Statically scanning Java code: Finding security vulnerabilities
-
DOI 10.1109/52.877869
-
J. Viega, G. McGraw, T. Mutdosch, and E. W. Felten. Statically scanning Java code: Finding security vulnerabilities. IEEE Software, 17(5):68-74, 2000. (Pubitemid 30940417)
-
(2000)
IEEE Software
, vol.17
, Issue.5
, pp. 68-74
-
-
Viega, J.1
McGraw, G.2
Mutdosch, T.3
Felten, E.W.4
-
28
-
-
67650518578
-
-
Secure programming for linux and unix howto.
-
D. A. Wheeler. Secure programming for linux and unix howto. http://www.dwheeler.com/secure-programs/.
-
-
-
Wheeler, D.A.1
-
30
-
-
0034857012
-
Alias analysis for Java with referenceset representation
-
J. Woo, J. Woo, I. Attali, D. Caromel, J.-L. Gaudiot, and A. L. Wendelborn. Alias analysis for Java with referenceset representation. In Proc. ICPADS, pages 459-466, 2001.
-
(2001)
Proc. ICPADS
, pp. 459-466
-
-
Woo, J.1
Woo, J.2
Attali, I.3
Caromel, D.4
Gaudiot, J.-L.5
Wendelborn, A.L.6
|