-
2
-
-
70349394182
-
Securing Java with local policies
-
Bartoletti, M., Costa, G., Degano, P., Martinelli,F., and Zunino, R. 2009. Securing Java with local policies. J. Object Technol. 8, 4, 5-32.
-
(2009)
J. Object Technol.
, vol.8
, Issue.4
, pp. 5-32
-
-
Bartoletti, M.1
Costa, G.2
Martinellif., D.P.3
Zunino, R.4
-
3
-
-
18944374558
-
Stack inspection and secure program transformations
-
Bartoletti, M., Degano,P., and Ferrari, G.-L. 2004. Stack inspection and secure program transformations. Int. J. Inform. Secur. 2, 3-4, 187-217.
-
(2004)
Int. J. Inform. Secur.
, vol.2
, Issue.3-4
, pp. 187-217
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.-L.3
-
4
-
-
33646177666
-
Checking risky events is enough for local policies
-
Lecture Notes in Computer Science, Springer, Berlin
-
Bartoletti, M., Degano,P., and Ferrari, G.-L. 2005a. Checking risky events is enough for local policies. In Proceedings of the 9th Italian Conference on Theoretical Computer Science (ICTCS). Lecture Notes in Computer Science, vol.3701. Springer, Berlin, 97-112.
-
(2005)
Proceedings of the 9th Italian Conference on Theoretical Computer Science (ICTCS)
, vol.3701
, pp. 97-112
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.-L.3
-
5
-
-
28144460333
-
Enforcing secure service composition
-
IEEE Computer Society, Los Alamitos, (Full version to appear in J. Comput. Secur)
-
Bartoletti, M., Degano,P., and Ferrari, G.-L. 2005b. Enforcing secure service composition. In Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW-18). IEEE Computer Society, Los Alamitos, 211-223. (Full version to appear in J. Comput. Secur.)
-
(2005)
Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW-18)
, pp. 211-223
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.-L.3
-
6
-
-
24644498665
-
History-based access control with local policies
-
Lecture Notes in Computer Science, Springer, Berlin
-
Bartoletti, M., Degano,P., and Ferrari, G.-L. 2005c. History-based access control with local policies. in Proceedings of the 8th Foundations of Sof tware Science and Computational Structures (FOSSACS). Lecture Notes in Computer Science, vol.3441. Springer, Berlin, 316-332.
-
(2005)
Proceedings of the 8th Foundations of Sof Tware Science and Computational Structures (FOSSACS)
, vol.3441
, pp. 316-332
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.-L.3
-
7
-
-
33947674820
-
Types and effects for secure service orchestration
-
IEEE Computer Society, Los Alamitos
-
Bartoletti, M., Degano,P., and Ferrari, G.-L. 2006. Types and effects for secure service orchestration. in Proceedings of the 19th IEEE Computer Security Foundations Workshop. (CSFW-19). IEEE Computer Society, Los Alamitos, 57-69.
-
(2006)
Proceedings of the 19th IEEE Computer Security Foundations Workshop. (CSFW-19)
, pp. 57-69
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.-L.3
-
8
-
-
37149004953
-
Types and effects for resource usage analysis
-
Lecture Notes in Computer Science, Springer, Berlin
-
Bartoletti, M., Degano, P., Ferrari, G.-L., and Zunino, R. 2007. Types and effects for resource usage analysis. In Proceedings of the 10th Foundations of Sof tware Science and Computational Structures (FOSSACS'07). Lecture Notes in Computer Science, vol.4423. Springer, Berlin, 32-47.
-
(2007)
Proceedings of the 10th Foundations of Sof Tware Science and Computational Structures (FOSSACS'07)
, vol.4423
, pp. 32-47
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.-L.3
Zunino, R.4
-
9
-
-
67650336844
-
Model checking usage policies
-
Lecture Notes in Computer Science, Springer, Berlin
-
Bartoletti, M., Degano, P., Ferrari, G. L., and Zunino, R. 2008. Model checking usage policies. In Proceedings of the 4th Trustworthy Global Computing. Lecture Notes in Computer Science, vol.5474. Springer, Berlin, 19-35.
-
(2008)
Proceedings of the 4th Trustworthy Global Computing
, vol.5474
, pp. 19-35
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.L.3
Zunino, R.4
-
12
-
-
31844457357
-
Composing security policies with Polymer
-
ACM, New York
-
Bauer, L., Ligatti,J., and Walker, D. 2005. Composing security policies with Polymer. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). ACM, New York, 305-314.
-
(2005)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)
, pp. 305-314
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
13
-
-
0021870594
-
Algebra of communicating processes with abstraction
-
Bergstra,J. A. and Klop, J. W. 1985. Algebra of communicating processes with abstraction. Theor. Comput. Sci. 37, 77-121.
-
(1985)
Theor. Comput. Sci.
, vol.37
, pp. 77-121
-
-
Bergstra, J.A.1
Klop, J.W.2
-
14
-
-
17044419188
-
Interfaces for stack inspection
-
Besson,F., de Grenier de Latour,T., and Jensen, T. P. 2005. Interfaces for stack inspection. J. Functional Program. 15, 2, 179-217.
-
(2005)
J. Functional Program.
, vol.15
, Issue.2
, pp. 179-217
-
-
Besson, F.1
De Grenier De Latour, T.2
Jensen, T.P.3
-
15
-
-
0034963556
-
Model-checking security properties of control flow graphs
-
Besson, F., Jensen, T. P., MEtayer, D. L., and Thorn, T. 2001. Model-checking security properties of control flow graphs. J. Comput. Secur. 9, 3, 217-250.
-
(2001)
J. Comput. Secur.
, vol.9
, Issue.3
, pp. 217-250
-
-
Besson, F.1
Jensen, T.P.2
Metayer, D.L.3
Thorn, T.4
-
17
-
-
0036041250
-
Types as models: Model-checking message-passing programs
-
ACM, New York
-
Chaki, S., Rajamani, S. K., and Rehof , J. 2002. Types as models: Model-checking message-passing programs. In Proceedings of the 29th Annual Symposium on Principles of Programming Languages (POPL). ACM, New York, 45-57.
-
(2002)
Proceedings of the 29th Annual Symposium on Principles of Programming Languages (POPL)
, pp. 45-57
-
-
Chaki, S.1
Rajamani, S.K.2
Rehof, J.3
-
20
-
-
0347307462
-
On the decidability of process equivalences for the pi-calculus
-
Dam, M. 1997. On the decidability of process equivalences for the pi-calculus. Theor. Comput. Sci. 183, 2, 215-228.
-
(1997)
Theor. Comput. Sci.
, vol.183
, Issue.2
, pp. 215-228
-
-
Dam, M.1
-
22
-
-
85010943862
-
On the decidability of model checking for several μl-calculi and Petri nets
-
Lecture Notes in Computer Science, Springer, Berlin
-
Esparza, J. 1994. On the decidability of model checking for several μl-calculi and Petri nets. In Proceedings of the 19th International Colloquium on Trees in Algebra and Programming (CAAP'94). Lecture Notes in Computer Science, vol.787. Springer, Berlin, 115-129.
-
(1994)
Proceedings of the 19th International Colloquium on Trees in Algebra and Programming (CAAP'94)
, vol.787
, pp. 115-129
-
-
Esparza, J.1
-
23
-
-
3543121920
-
Access control by tracking shallow execution history
-
IEEE Computer Society, Los Alamitos
-
Fong, P. W. 2004. Access control by tracking shallow execution history. In Proceedings of the IEEE Symposium on Security and Privacy (S&P04). IEEE Computer Society, Los Alamitos, 43-55.
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy (S&P04)
, pp. 43-55
-
-
Fong, P.W.1
-
25
-
-
33745329295
-
Computability classes for enforcement mechanisms
-
Hamlen, K. W., Morrisett, J. G., and Schneider, F. B. 2006. Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst. 28, 1, 175-205.
-
(2006)
ACM Trans. Program. Lang. Syst.
, vol.28
, Issue.1
, pp. 175-205
-
-
Hamlen, K.W.1
Morrisett, J.G.2
Schneider, F.B.3
-
27
-
-
34250647106
-
Resource usage analysis for a functional language with exceptions
-
DOI 10.1145/1111542.1111550, PEPM 2006: Proceedings of the Workshop on Partial Evaluation and Program Manipulation
-
Iwama, F., Igarashi, A., and Kobayashi, N. 2006. Resource usage analysis for a functional language with exceptions. in Proceedings of the ACM SIGPLAN Workshop on Partial Evaluation and Semantics-Based Program Manipulation. ACM, New York, 38-47. (Pubitemid 46946395)
-
(2006)
Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation
, pp. 38-47
-
-
Iwama, F.1
Igarashi, A.2
Kobayashi, N.3
-
29
-
-
49049126479
-
Results on the propositional μ-calculus
-
Kozen, D. 1983. Results on the propositional μ-calculus. Theor. Comput. Sci. 27, 333-354.
-
(1983)
Theor. Comput. Sci.
, vol.27
, pp. 333-354
-
-
Kozen, D.1
-
30
-
-
0344583792
-
Resource usage verification
-
Lecture Notesin Computer Science, Springer, Berlin
-
Marriott, K., Stuckey,P.J., and Sulzmann, M. 2003. Resource usage verification. In Proceedings of the 1st Asian Symposium on Programming Languages and Systems (APLAS'03). Lecture Notesin Computer Science, vol.2895. Springer, Berlin, 212-229.
-
(2003)
Proceedings of the 1st Asian Symposium on Programming Languages and Systems (APLAS'03)
, vol.2895
, pp. 212-229
-
-
Marriott, K.1
Stuckey, P.J.2
Sulzmann, M.3
-
32
-
-
44049114041
-
A calculus of mobile processes, i and II
-
Milner, R., Parrow,J., and Walker, D. 1992. A calculus of mobile processes, I and II. Inform. Comput. 100, 1, 1-40, 41-77.
-
(1992)
Inform. Comput. 100
, vol.1
, Issue.1-40
, pp. 41-77
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
37
-
-
35048838770
-
History effects and verification
-
Lecture Notes in Computer Science, Springer, Berlin
-
Skalka,C. and Smith, S. 2004. History effects and verification. In Proceedings of the 2nd Asian Symposium on Programming Languages and Systems (APLAS04). Lecture Notes in Computer Science, vol.3302. Springer, Berlin, 107-128.
-
(2004)
Proceedings of the 2nd Asian Symposium on Programming Languages and Systems (APLAS04)
, vol.3302
, pp. 107-128
-
-
Skalka, C.1
Smith, S.2
-
38
-
-
38949181922
-
Types and trace effects of higher-order programs
-
Skalka, C., Smith,S., and Horn, D. V. 2008. Types and trace effects of higher-order programs. J. Functional Program. 18, 2, 179-249.
-
(2008)
J. Functional Program.
, vol.18
, Issue.2
, pp. 179-249
-
-
Skalka, C.1
Smith, S.2
Horn, D.V.3
-
39
-
-
84974191759
-
Polymorphic type, region and effect inference
-
Talpin, J.-P. and Jouvelot, P. 1992. Polymorphic type, region and effect inference. J. Functional Program. 2, 3, 245-271.
-
(1992)
J. Functional Program.
, vol.2
, Issue.3
, pp. 245-271
-
-
Talpin, J.-P.1
Jouvelot, P.2
-
41
-
-
0038189566
-
Program specialization for execution monitoring
-
Thiemann, P. 2003. Program specialization for execution monitoring. J. Functional Program. 13, 3, 573-600.
-
(2003)
J. Functional Program.
, vol.13
, Issue.3
, pp. 573-600
-
-
Thiemann, P.1
-
43
-
-
0039334688
-
SAFKASI: A security mechanism for language-based systems
-
Wallach,D.S., Appel,A.W., and Felten, E. W. 2000. SAFKASI: A security mechanism for language-based systems. ACM Trans. Sof tw. Eng. Methodol. 9, 4, 341-378.
-
(2000)
ACM Trans. Softw. Eng. Methodol.
, vol.9
, Issue.4
, pp. 341-378
-
-
Wallach, D.S.1
Appel, A.W.2
Felten, E.W.3
-
44
-
-
33750274822
-
HBAC: A model for history-based access control and its model-checking
-
Lecture Notes in Computer Science, Springer, Berlin
-
Wang, J., Takata,Y., and Seki, H. 2006. HBAC: A model for history-based access control and its model-checking. In Proceedings of the 11th European Symposium on Research in Computer Security (ESORICS'06). Lecture Notes in Computer Science, vol.4189. Springer, Berlin, 263-278.
-
(2006)
Proceedings of the 11th European Symposium on Research in Computer Security (ESORICS'06)
, vol.4189
, pp. 263-278
-
-
Wang, J.1
Takata, Y.2
Seki, H.3
|