-
3
-
-
24144435318
-
History-based access control and secure information flow
-
Berlin, Springer
-
A. Banerjee and D. A. Naumann. History-based access control and secure information flow. In Proceedings of the Workshop on Construction and Analysis of Safe, Secure and Interoperable Smart Cards, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers, volume 3362 of Lecture Notes in Computer Science, pages 27-48, Berlin, 2005. Springer.
-
(2005)
Proceedings of the Workshop on Construction and Analysis of Safe, Secure and Interoperable Smart Cards, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers, of Lecture Notes in Computer Science
, pp. 27-48
-
-
Banerjee, A.1
Naumann, D.A.2
-
4
-
-
38549137266
-
Jack a tool for validation of security and behaviour of Java applications
-
Springer
-
G. Barthe, L. Burdy, J. Charles, B. Grégoire, M. Huisman, J.-L. Lanet, M. Pavlova, and A. Requet. Jack a tool for validation of security and behaviour of Java applications. In Formal Methods for Components and Objects, 5th International Symposium, Amsterdam, NL, November 7-10, 2006, Revised Lectures, volume 4709 of Lecture Notes in Computer Science, pages 152-174. Springer, 2007.
-
(2007)
Formal Methods for Components and Objects, 5th International Symposium, Amsterdam, NL, November 7-10, 2006, Revised Lectures, of Lecture Notes in Computer Science
, vol.4709
, pp. 152-174
-
-
Barthe, G.1
Burdy, L.2
Charles, J.3
Grégoire, B.4
Huisman, M.5
Lanet, J.-L.6
Pavlova, M.7
Requet, A.8
-
5
-
-
70349316580
-
Usage automata
-
Berlin, Springer. to appear
-
M. Bartoletti. Usage automata. In Workshop on Issues in the Theory of Security, York, UK, volume 5511 of Lecture Notes in Computer Science, Berlin, 2009. Springer. to appear.
-
(2009)
Workshop on Issues in the Theory of Security, York, UK, of Lecture Notes in Computer Science
, vol.5511
-
-
Bartoletti, M.1
-
6
-
-
18944377182
-
Static analysis for stack inspection
-
M. Bartoletti, P. Degano, and G.-L. Ferrari. Static analysis for stack inspection. In Proceedings of the International Workshop on Concurrency and Coordination, Electr. Notes Theor. Comput. Sci., volume 54, 2001.
-
(2001)
Proceedings of the International Workshop on Concurrency and Coordination, Electr. Notes Theor. Comput. Sci.
, vol.54
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.-L.3
-
7
-
-
24644498665
-
History based access control with local policies
-
Berlin, Springer
-
M. Bartoletti, P. Degano, and G.-L. Ferrari. History based access control with local policies. In Proceedings of the 8th Foundations of Software Science and Computational Structures, FOSSACS 2005, Edinburgh, UK, April 4-8, 2005, volume 3441 of Lecture Notes in Computer Science, pages 316-332, Berlin, 2005. Springer.
-
(2005)
Proceedings of the 8th Foundations of Software Science and Computational Structures, FOSSACS 2005, Edinburgh, UK, April 4-8, 2005, of Lecture Notes in Computer Science
, vol.3441
, pp. 316-332
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.-L.3
-
8
-
-
37149004953
-
Types and effects for resource usage analysis
-
Berlin, Springer
-
M. Bartoletti, P. Degano, G.-L. Ferrari, and R. Zunino. Types and effects for resource usage analysis. In Proceedings of the 10th Foundations of Software Science and Computational Structures, FOSSACS 2007, Braga, Portugal, March 24-April 1, 2007, volume 4423 of Lecture Notes in Computer Science, pages 32-47, Berlin, 2007. Springer
-
(2007)
Proceedings of the 10th Foundations of Software Science and Computational Structures, FOSSACS 2007, Braga, Portugal, March 24-April 1, 2007, of Lecture Notes in Computer Science
, vol.4423
, pp. 32-47
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.-L.3
Zunino, R.4
-
9
-
-
40449126543
-
Semantics-based design for secure web services
-
M. Bartoletti, P. Degano, G. L. Ferrari, and R. Zunino. Semantics-based design for secure web services. IEEE Trans. Software Eng., 34(1), 2008.
-
(2008)
IEEE Trans. Software Eng.
, vol.34
, Issue.1
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.L.3
Zunino, R.4
-
10
-
-
67650336844
-
Model checking usage policies
-
Lecture Notes in Computer Science, Berlin, Springer. to appear
-
M. Bartoletti, P. Degano, G. L. Ferrari, and R. Zunino. Model checking usage policies. In Proceedings of the 4th Trustworthy Global Computing, Barcelona, Spain, November 3-4, 2008, Lecture Notes in Computer Science, Berlin, 2009. Springer. to appear.
-
(2009)
Proceedings of the 4th Trustworthy Global Computing, Barcelona, Spain, November 3-4, 2008
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.L.3
Zunino, R.4
-
13
-
-
31844457357
-
Composing security policies with Polymer
-
New York, ACM
-
L. Bauer, J. Ligatti, and D. Walker. Composing security policies with Polymer. In Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation (PLDI), Chicago, IL, USA, June 12-15, 2005, pages 305-314, New York, 2005. ACM.
-
(2005)
Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation (PLDI), Chicago, IL, USA, June 12-15, 2005
, pp. 305-314
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
14
-
-
0021870594
-
Algebra of communicating processes with abstraction
-
J. A. Bergstra and J. W. Klop. Algebra of communicating processes with abstraction. Theor. Comput. Sci., 37:77-121, 1985.
-
(1985)
Theor. Comput. Sci.
, vol.37
, pp. 77-121
-
-
Bergstra, J.A.1
Klop, J.W.2
-
17
-
-
70349407008
-
-
Verification on infinite structures
-
O. Burkart, D. Caucal, F. Moller, and B. Steffen. Verification on infinite structures http://www-compsci.swan.ac.uk/~csfm/Pubs/handbook01.pdf.
-
-
-
Burkart, O.1
Caucal, D.2
Moller, F.3
Steffen, B.4
-
20
-
-
37849002157
-
Security-by-contract: Toward a semantics for digital signatures on mobile code
-
Springer
-
N. Dragoni, F. Massacci, K. Naliuka, and I. Siahaan. Security-by-contract: Toward a semantics for digital signatures on mobile code. In EuroPKI, volume 4582 of Lecture Notes in Computer Science, pages 297-312. Springer, 2007.
-
(2007)
EuroPKI, of Lecture Notes in Computer Science
, vol.4582
, pp. 297-312
-
-
Dragoni, N.1
Massacci, F.2
Naliuka, K.3
Siahaan, I.4
-
21
-
-
84982912143
-
History-based access control for mobile code
-
Berlin, Springer
-
G. Edjlali, A. Acharya, and V. Chaudhary. History-based access control for mobile code. In Secure Internet Programming, volume 1603 of Lecture Notes in Computer Science, pages 413-431, Berlin, 1999. Springer.
-
(1999)
Secure Internet Programming, of Lecture Notes in Computer Science
, vol.1603
, pp. 413-431
-
-
Edjlali, G.1
Acharya, A.2
Chaudhary, V.3
-
22
-
-
85010943862
-
On the decidability of model checking for several μ-calculi and Petri nets
-
Berlin, Springer
-
J. Esparza. On the decidability of model checking for several μ-calculi and Petri nets. In Proceedings of the 19th Int. Colloquium on Trees in Algebra and Programming (CAAP'94), Edinburgh, U.K., April 11-13, 1994, volume 787 of Lecture Notes in Computer Science, pages 115-129, Berlin, 1994. Springer.
-
(1994)
Proceedings of the 19th Int. Colloquium on Trees in Algebra and Programming (CAAP'94), Edinburgh, U.K., April 11-13, 1994, of Lecture Notes in Computer Science
, vol.787
, pp. 115-129
-
-
Esparza, J.1
-
23
-
-
84944409009
-
Efficient algorithms for model checking pushdown systems
-
Springer
-
J. Esparza, D. Hansel, P. Rossmanith, and S. Schwoon. Efficient algorithms for model checking pushdown systems. In Computer Aided Verification, 12th International Conference, CAV 2000, Chicago, IL, USA, July 15-19, 2000, Proceedings, volume 1855 of Lecture Notes in Computer Science, pages 232-247. Springer, 2000.
-
(2000)
Computer Aided Verication, 12th International Conference, CAV 2000, Chicago, IL, USA, July 15-19, 2000, Proceedings, of Lecture Notes in Computer Science
, vol.1855
, pp. 232-247
-
-
Esparza, J.1
Hansel, D.2
Rossmanith, P.3
Schwoon, S.4
-
24
-
-
3543121920
-
Access control by tracking shallow execution history
-
Berkeley, CA, USA, Los Alamitos, IEEE Computer Society
-
P. W. Fong. Access control by tracking shallow execution history. In Proceedings of the IEEE Symposium on Security and Privacy (S&P 2004), 9-12 May 2004, Berkeley, CA, USA, pages 43-55, Los Alamitos, 2004. IEEE Computer Society.
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy (S&P 2004), 9-12 May 2004
-
-
Fong, P.W.1
-
27
-
-
0011792814
-
A framework for call graph construction algorithms
-
D. Grove and C. Chambers. A framework for call graph construction algorithms. ACM Trans. Program. Lang. Syst., 23(6):685-746, 2001.
-
(2001)
ACM Trans. Program. Lang. Syst.
, vol.23
, Issue.6
, pp. 685-746
-
-
Grove, D.1
Chambers, C.2
-
28
-
-
33745329295
-
Computability classes for enforcement mechanisms
-
K. W. Hamlen, J. G. Morrisett, and F. B. Schneider. Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst., 28(1):175-205, 2006.
-
(2006)
ACM Trans. Program. Lang. Syst.
, vol.28
, Issue.1
, pp. 175-205
-
-
Hamlen, K.W.1
Morrisett, J.G.2
Schneider, F.B.3
-
30
-
-
48649101461
-
Extending the Java Virtual Machine to enforce fine-grained security policies in mobile devices
-
I. Ion, B. Dragovic, and B. Crispo. Extending the Java Virtual Machine to enforce fine-grained security policies in mobile devices. In ACSAC, 2007.
-
(2007)
ACSAC
-
-
Ion, I.1
Dragovic, B.2
Crispo, B.3
-
31
-
-
70349402788
-
-
Jalapa: Securing Java with Local Policies
-
Jalapa: Securing Java with Local Policies http://jalapa.sourceforge.net/.
-
-
-
-
32
-
-
0000913573
-
JML: A notation for detailed design
-
H. Kilov, B. Rumpe, and I. Simmonds, editors, Kluwer Academic Publishers
-
G. T. Leavens, A. L. Baker, and C. Ruby. JML: A notation for detailed design. In H. Kilov, B. Rumpe, and I. Simmonds, editors, Behavioral Specifications of Businesses and Systems, pages 175-188. Kluwer Academic Publishers, 1999.
-
(1999)
Behavioral Specifications of Businesses and Systems
, pp. 175-188
-
-
Leavens, G.T.1
Baker, A.L.2
Ruby, C.3
-
33
-
-
0344583792
-
Resource usage verication
-
Berlin, Springer
-
K. Marriott, P. J. Stuckey, and M. Sulzmann. Resource usage verification. In Proceedings of the First Asian Symposium on Programming Languages and Systems, APLAS 2003, Beijing, China, November 27-29, 2003, volume 2895 of Lecture Notes in Computer Science, pages 212-229, Berlin, 2003. Springer.
-
(2003)
Proceedings of the First Asian Symposium on Programming Languages and Systems, APLAS 2003, Beijing, China, November 27-29, 2003, of Lecture Notes in Computer Science
, vol.2895
, pp. 212-229
-
-
Marriott, K.1
Stuckey, P.J.2
Sulzmann, M.3
-
34
-
-
38049039341
-
Enhancing java security with history based access control
-
Springer
-
F. Martinelli and P. Mori. Enhancing java security with history based access control. In Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures, volume 4677 of Lecture Notes in Computer Science, pages 135-159. Springer, 2007.
-
(2007)
Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures, of Lecture Notes in Computer Science
, vol.4677
, pp. 135-159
-
-
Martinelli, F.1
Mori, P.2
-
35
-
-
33845332032
-
Towards continuous usage control on grid computational services
-
F. Martinelli, P. Mori, and A. Vaccarelli. Towards continuous usage control on grid computational services. In ICAS/ICNS, 2005.
-
(2005)
ICAS/ICNS
-
-
Martinelli, F.1
Mori, P.2
Vaccarelli, A.3
-
39
-
-
84947907563
-
Providing fine-grained access control for java programs
-
Springer
-
R. Pandey and B. Hashii. Providing fine-grained access control for java programs. In ECCOP'99 - Object-Oriented Programming, 13th European Conference, Lisbon, Portugal, June 14-18, 1999, Proceedings, volume 1628 of Lecture Notes in Computer Science, pages 449-473. Springer, 1999.
-
(1999)
ECCOP'99 - Object-Oriented Programming, 13th European Conference, Lisbon, Portugal, June 14-18, 1999, Proceedings, of Lecture Notes in Computer Science
, vol.1628
, pp. 449-473
-
-
Pandey, R.1
Hashii, B.2
-
40
-
-
0036961608
-
Experience with statically-generated proxies for facilitating Java runtime specialisation
-
Dec
-
K. V. Renaud. Experience with statically-generated proxies for facilitating Java runtime specialisation. IEEE Proc. Software, 149(6), Dec 2002.
-
(2002)
IEEE Proc. Software
-
-
Renaud, K.V.1
-
42
-
-
35048838770
-
History effects and verification
-
Berlin, Springer
-
C. Skalka and S. Smith. History effects and verification. In Proceedings of the Second Asian Symposium on Programming Languages and Systems, APLAS 2004, Taipei, Taiwan, November 4-6, 2004, volume 3302 of Lecture Notes in Computer Science, pages 107-128, Berlin, 2004. Springer.
-
(2004)
Proceedings of the Second Asian Symposium on Programming Languages and Systems, APLAS 2004, Taipei, Taiwan, November 4-6, 2004, of Lecture Notes in Computer Science
, vol.3302
, pp. 107-128
-
-
Skalka, C.1
Smith, S.2
-
43
-
-
70349377394
-
-
Soot: a Java optimization, framework
-
Soot: a Java optimization framework http://www.sable.mcgill.ca/soot/.
-
-
-
-
44
-
-
37149042160
-
Enforcing safety properties using type specialization
-
P. Thiemann. Enforcing safety properties using type specialization. In Proc. ESOP, 2001.
-
(2001)
Proc. ESOP
-
-
Thiemann, P.1
-
46
-
-
33750274822
-
HBAC:A model for history-based access control and its model checking
-
Berlin, Springer
-
J. Wang, Y. Takata, and H. Seki. HBAC: A model for history-based access control and its model checking. In 11th European Symposium on Research in Computer Security - ESORICS 2006, Hamburg, Germany, September 18-20, 2006, volume 4189 of Lecture Notes in Computer Science, pages 263-278, Berlin, 2006. Springer.
-
(2006)
11th European Symposium on Research in Computer Security - ESORICS 2006, Hamburg, Germany, September 18-20, 2006, of Lecture Notes in Computer Science
, vol.4189
, pp. 263-278
-
-
Wang, J.1
Takata, Y.2
Seki, H.3
|