-
1
-
-
33845384768
-
Mapbox: Using parameterized behavior classes to confine applications
-
Technical report, Santa Barbara, CA, USA
-
Anurag Acharya and Mandar Raje. Mapbox: Using parameterized behavior classes to confine applications. Technical report, Santa Barbara, CA, USA, 1999.
-
(1999)
-
-
Acharya, A.1
Raje, M.2
-
3
-
-
38349000437
-
-
Sun Microsystems, Inc. Mountain View, CA, USA
-
Deepak Alur, Dan Malks, John Crupi, Grady Booch, and Martin Fowler. Core J2EE Patterns (Core Design Series): Best Practices and Design Strategies. Sun Microsystems, Inc. Mountain View, CA, USA, 2003.
-
(2003)
Core J2EE Patterns (Core Design Series): Best Practices and Design Strategies
-
-
Alur, D.1
Malks, D.2
Crupi, J.3
Booch, G.4
Fowler, M.5
-
6
-
-
85084162921
-
-
David Brumley and Dawn Song. Privtrans: Automatically partitioning programs for privilege separation. In Proceedings of the 13th USENIX Security Symposium, August 2004.
-
David Brumley and Dawn Song. Privtrans: Automatically partitioning programs for privilege separation. In Proceedings of the 13th USENIX Security Symposium, August 2004.
-
-
-
-
7
-
-
70349675001
-
-
Koen Buyens, Bart De Win, and Wouter Joosen. Identifying and resolving least privilege violations in software architectures. Technical report, Katholieke Universiteit Leuven, 2008, to be published.
-
Koen Buyens, Bart De Win, and Wouter Joosen. Identifying and resolving least privilege violations in software architectures. Technical report, Katholieke Universiteit Leuven, 2008, to be published.
-
-
-
-
8
-
-
2942749266
-
Bluebox: A policy-driven, hostbased intrusion detection system
-
Suresh N. Chari and Pau-Chen Cheng. Bluebox: A policy-driven, hostbased intrusion detection system. ACM Trans. Inf. Syst. Secur., 6(2):173-200, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.2
, pp. 173-200
-
-
Chari, S.N.1
Cheng, P.-C.2
-
10
-
-
0006029493
-
-
Pearson Education
-
Paul Clements, David Garlan, Len Bass, Judith Stafford, Robert Nord, James Ivers, and Reed Little. Documenting Software Architectures: Views and Beyond. Pearson Education, 2002.
-
(2002)
Documenting Software Architectures: Views and Beyond
-
-
Clements, P.1
Garlan, D.2
Bass, L.3
Stafford, J.4
Nord, R.5
Ivers, J.6
Little, R.7
-
11
-
-
34548777513
-
Archstudio 4: An architecture-based meta-modeling environment
-
Washington, DC, USA, IEEE Computer Society
-
Eric Dashofy, Hazel Asuncion, Scott Hendrickson, Girish Suryanarayana, John Georgas, and Richard Taylor. Archstudio 4: An architecture-based meta-modeling environment. In ICSE COMPANION '07: Companion to the proceedings of the 29th International Conference on Software Engineering, pages 67-68, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
ICSE COMPANION '07: Companion to the proceedings of the 29th International Conference on Software Engineering
, pp. 67-68
-
-
Dashofy, E.1
Asuncion, H.2
Hendrickson, S.3
Suryanarayana, G.4
Georgas, J.5
Taylor, R.6
-
12
-
-
20444505719
-
Mac and uml for secure software design. In FMSE '04
-
New York, NY, USA, ACM
-
Thuong Doan, Steven Demurjian, T. C. Ting, and Andreas Ketterl. Mac and uml for secure software design. In FMSE '04: Proceedings of the 2004 ACM workshop on Formal methods in security engineering, pages 75-85, New York, NY, USA, 2004. ACM.
-
(2004)
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
, pp. 75-85
-
-
Doan, T.1
Steven Demurjian, T.C.T.2
Ketterl, A.3
-
13
-
-
33750712450
-
Refactoring
-
Addison-Wesley Professional, June
-
Martin Fowler, Kent Beck, John Brant, William Opdyke, and Don Roberts. Refactoring: Improving the Design of Existing Code. Addison-Wesley Professional, June 1999.
-
(1999)
Improving the Design of Existing Code
-
-
Fowler, M.1
Beck, K.2
Brant, J.3
Opdyke, W.4
Roberts, D.5
-
14
-
-
57349158625
-
-
S. Höhn and J. Jürjens. Rubacon: automated support for modelbased compliance engineering. In Proceedings of the 13th international conference on Software engineering, pages 875-878. ACM New York, NY, USA, 2008.
-
S. Höhn and J. Jürjens. Rubacon: automated support for modelbased compliance engineering. In Proceedings of the 13th international conference on Software engineering, pages 875-878. ACM New York, NY, USA, 2008.
-
-
-
-
17
-
-
70349695664
-
-
K. Jain and R. Sekar. User-level infrastructure for system call interposition: A platform for intrusion detection and confinement. In In ISOC Network and Distributed System Security, 2000.
-
K. Jain and R. Sekar. User-level infrastructure for system call interposition: A platform for intrusion detection and confinement. In In ISOC Network and Distributed System Security, 2000.
-
-
-
-
20
-
-
58049188768
-
Van Landuyt, Johan Gregoire, Sam Michiels, Eddy Truyen, and Wouter Joosen. Architectural design of a digital publishing system
-
Technical report, October
-
Dimitri Van Landuyt, Johan Gregoire, Sam Michiels, Eddy Truyen, and Wouter Joosen. Architectural design of a digital publishing system. Technical report, October 2006.
-
(2006)
-
-
Dimitri1
-
21
-
-
0037368172
-
An empiricallybased process for software architecture evaluation
-
March
-
Mikael Lindvall, Roseanne T. Tvedt, and Patricia Costa. An empiricallybased process for software architecture evaluation. Empirical Software Engineering, 8(1):83-108, March 2003.
-
(2003)
Empirical Software Engineering
, vol.8
, Issue.1
, pp. 83-108
-
-
Lindvall, M.1
Tvedt, R.T.2
Costa, P.3
-
22
-
-
70349693438
-
-
Pratyusa K. Manadhata, Dilsun K. Kaynar, and Jeannette M. Wing. A formal model for a systems attack surface. Technical Report CMU-CS- 07-144, Carnegie Mellon University, 2007.
-
Pratyusa K. Manadhata, Dilsun K. Kaynar, and Jeannette M. Wing. A formal model for a systems attack surface. Technical Report CMU-CS- 07-144, Carnegie Mellon University, 2007.
-
-
-
-
23
-
-
0017291489
-
A complexity measure. In ICSE '76
-
Los Alamitos, CA, USA, IEEE Computer Society Press
-
Thomas J. McCabe. A complexity measure. In ICSE '76: Proceedings of the 2nd international conference on Software engineering, page 407, Los Alamitos, CA, USA, 1976. IEEE Computer Society Press.
-
(1976)
Proceedings of the 2nd international conference on Software engineering
, pp. 407
-
-
McCabe, T.J.1
-
25
-
-
43949109911
-
-
Mirko Morandini, Duy Cu Nguyen, Anna Perini, Alberto Siena, and Angelo Susi. Tool-supported development with tropos: The conference management system case study. In Michael Luck and Lin Padgham, editors, Agent Oriented Software Engineering VIII, 4951 of LNCS, pages 182-196. Springer, 2008.
-
Mirko Morandini, Duy Cu Nguyen, Anna Perini, Alberto Siena, and Angelo Susi. Tool-supported development with tropos: The conference management system case study. In Michael Luck and Lin Padgham, editors, Agent Oriented Software Engineering VIII, volume 4951 of LNCS, pages 182-196. Springer, 2008.
-
-
-
-
26
-
-
85084160542
-
-
David S. Peterson, Matt Bishop, and Raju Pandey. A flexible containment mechanism for executing untrusted code. In Proceedings of the 11th USENIX Security Symposium, pages 207-225, Berkeley, CA, USA, 2002. USENIX Association.
-
David S. Peterson, Matt Bishop, and Raju Pandey. A flexible containment mechanism for executing untrusted code. In Proceedings of the 11th USENIX Security Symposium, pages 207-225, Berkeley, CA, USA, 2002. USENIX Association.
-
-
-
-
27
-
-
70349652782
-
-
Niels Provos. Systrace, interactive policy generation for system calls
-
Niels Provos. Systrace - interactive policy generation for system calls.
-
-
-
-
28
-
-
70349655052
-
-
Jie Ren. A connector-centric approach to architectural access control. PhD thesis, Long Beach, CA, USA, 2006. Adviser-Richard N. Taylor.
-
Jie Ren. A connector-centric approach to architectural access control. PhD thesis, Long Beach, CA, USA, 2006. Adviser-Richard N. Taylor.
-
-
-
-
29
-
-
0016555241
-
The protection of information in computer systems
-
September
-
Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278- 1308, September 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
31
-
-
84881225236
-
Enforceable security policies
-
Fred B. Schneider. Enforceable security policies. ACM Trans. Inf. Syst. Secur., 3(1):30-50, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
33
-
-
0242671076
-
Janus: An approach for confinement of untrusted applications
-
Technical Report CSD-99-1056, 12
-
David A. Wagner. Janus: an approach for confinement of untrusted applications. Technical Report CSD-99-1056, 12, 1999.
-
(1999)
-
-
Wagner, D.A.1
-
34
-
-
85084161648
-
Confining root programs with domain and type enforcement (dte)
-
Berkeley, CA, USA, USENIX Association
-
Kenneth M. Walker, Daniel F. Sterne, M. Lee Badger, Michael J. Petkac, David L. Sherman, and Karen A. Oostendorp. Confining root programs with domain and type enforcement (dte). In SSYM'96: Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography, pages 3-3, Berkeley, CA, USA, 1996. USENIX Association.
-
(1996)
SSYM'96: Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography
, pp. 3-3
-
-
Walker, K.M.1
Sterne, D.F.2
Lee Badger, M.3
Petkac, M.J.4
Sherman, D.L.5
Oostendorp, K.A.6
-
35
-
-
0036612912
-
A methodology for architecturelevel reliability risk analysis
-
June
-
Sherif M. Yacoub and Hany H. Ammar. A methodology for architecturelevel reliability risk analysis. IEEE Transactions on Software Engineering, 28(6):529-547, June 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.6
, pp. 529-547
-
-
Yacoub, S.M.1
Ammar, H.H.2
|