메뉴 건너뛰기




Volumn 5511 LNCS, Issue , 2009, Pages 52-69

Usage automata

Author keywords

[No Author keywords available]

Indexed keywords

EXPRESSIVE POWER; FOUNDATIONAL ASPECTS; MODEL SECURITY; REAL-WORLD APPLICATION; RUNTIMES; USAGE POLICIES;

EID: 70349316580     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03459-6_4     Document Type: Conference Paper
Times cited : (10)

References (17)
  • 3
    • 37149004953 scopus 로고    scopus 로고
    • Types and effects for resource usage analysis
    • Seidl, H, ed, FOSSACS 2007, Springer, Heidelberg
    • Bartoletti, M., Degano, P., Ferrari, G.-L., Zunino, R.: Types and effects for resource usage analysis. In: Seidl, H. (ed.) FOSSACS 2007. LNCS, vol. 4423, pp. 32-47. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4423 , pp. 32-47
    • Bartoletti, M.1    Degano, P.2    Ferrari, G.-L.3    Zunino, R.4
  • 4
    • 67650336844 scopus 로고    scopus 로고
    • Model checking usage policies
    • Proceedings of the 4th Trustworthy Global Computing, Barcelona, Spain, Springer, Heidelberg
    • Bartoletti, M., Degano, P., Ferrari, G.L., Zunino, R.: Model checking usage policies. In: Proceedings of the 4th Trustworthy Global Computing, Barcelona, Spain. LNCS, vol. 5474, pp. 19-35. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5474 , pp. 19-35
    • Bartoletti, M.1    Degano, P.2    Ferrari, G.L.3    Zunino, R.4
  • 8
    • 84982912143 scopus 로고    scopus 로고
    • History-based access control for mobile code
    • Vitek, J, ed, Secure Internet Programming, Springer, Heidelberg
    • Edjlali, G., Acharya, A., Chaudhary, V.: History-based access control for mobile code. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol. 1603. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1603
    • Edjlali, G.1    Acharya, A.2    Chaudhary, V.3
  • 9
    • 3543121920 scopus 로고    scopus 로고
    • Access control by tracking shallow execution history
    • Berkeley, CA, USA, May 9-12, pp, IEEE Computer Society, Los Alamitos
    • Fong, P.W.: Access control by tracking shallow execution history. In: Proceedings of the IEEE Symposium on Security and Privacy (S&P 2004), Berkeley, CA, USA, May 9-12, pp. 43-55. IEEE Computer Society, Los Alamitos (2004)
    • (2004) Proceedings of the IEEE Symposium on Security and Privacy (S&P , pp. 43-55
    • Fong, P.W.1
  • 14
    • 38049039341 scopus 로고    scopus 로고
    • Enhancing java security with history based access control
    • Aldini, A, Gorrieri, R, eds, FOSAD 2007, Springer, Heidelberg
    • Martinelli, F., Mori, P.: Enhancing java security with history based access control. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2007. LNCS, vol. 4677, pp. 135-159. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4677 , pp. 135-159
    • Martinelli, F.1    Mori, P.2
  • 15
    • 84947907563 scopus 로고    scopus 로고
    • Providing fine-grained access control for java programs
    • Guerraoui, R, ed, ECOOP 1999, Springer, Heidelberg
    • Pandey, R., Hashii, B.: Providing fine-grained access control for java programs. In: Guerraoui, R. (ed.) ECOOP 1999. LNCS, vol. 1628, pp. 449-473. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1628 , pp. 449-473
    • Pandey, R.1    Hashii, B.2
  • 17
    • 35048838770 scopus 로고    scopus 로고
    • Skalka, C., Smith, S.: History effects and verification. In: Chin, W.-N. (ed.) APLAS 2004. LNCS, 3302, pp. 107-128. Springer, Heidelberg (2004)
    • Skalka, C., Smith, S.: History effects and verification. In: Chin, W.-N. (ed.) APLAS 2004. LNCS, vol. 3302, pp. 107-128. Springer, Heidelberg (2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.