-
1
-
-
33745329295
-
Computability classes for enforcement mechanisms
-
Hamlen, K.W., Morrisett, G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst. 28(1), 175-205 (2006)
-
(2006)
ACM Trans. Program. Lang. Syst
, vol.28
, Issue.1
, pp. 175-205
-
-
Hamlen, K.W.1
Morrisett, G.2
Schneider, F.B.3
-
3
-
-
0033489650
-
Sasi enforcement of security policies: A retrospective
-
Caledon Hills, Ontario, Canada, pp, ACM Press, New York
-
Erlingsson, U., Schneider, F.B.: Sasi enforcement of security policies: a retrospective. In: Proceedings of the New Security Paradigms Workshop, Caledon Hills, Ontario, Canada, pp. 87-95. ACM Press, New York (2000)
-
(2000)
Proceedings of the New Security Paradigms Workshop
, pp. 87-95
-
-
Erlingsson, U.1
Schneider, F.B.2
-
5
-
-
70350415220
-
-
Viswanathan, M, Foundations for the Run-time Analysis of Software Systems. PhD thesis, University of Pennsylvania
-
Viswanathan, M.: Foundations for the Run-time Analysis of Software Systems. PhD thesis, University of Pennsylvania (2000)
-
(2000)
-
-
-
6
-
-
33646066871
-
-
Ligatti, J., Bauer, L., Walker, D.: Enforcing non-safety security policies with program monitors. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, 3679, pp. 355-373. Springer, Heidelberg (2005)
-
Ligatti, J., Bauer, L., Walker, D.: Enforcing non-safety security policies with program monitors. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 355-373. Springer, Heidelberg (2005)
-
-
-
-
7
-
-
13444275220
-
-
Ligatti, J., Bauer, L., Walker, D.: Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security 4(1-2), 2-16 (2005) (published online 26 October 2004)
-
Ligatti, J., Bauer, L., Walker, D.: Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security 4(1-2), 2-16 (2005) (published online 26 October 2004)
-
-
-
-
8
-
-
14844332191
-
More enforceable security policies
-
Copenhagen, Denmark, July 25-26, pp
-
Bauer, L., Ligatti, J., Walker, D.: More enforceable security policies. In: Foundations of Computer Security, Copenhagen, Denmark, July 25-26, pp. 95-104 (2002)
-
(2002)
Foundations of Computer Security
, pp. 95-104
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
9
-
-
33646067678
-
Enforcing non-safety security policies with program monitors
-
Technical Report TR-720-05, Princeton University January
-
Ligatti, J., Bauer, L., Walker, D.: Enforcing non-safety security policies with program monitors. Technical Report TR-720-05, Princeton University (January 2005)
-
(2005)
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
10
-
-
35248828504
-
Aspect-oriented programming
-
Akşit, M, Matsuoka, S, eds, ECOOP 1997, Springer, Heidelberg
-
Kiczales, G., Lamping, J., Menhdhekar, A., Maeda, C., Lopes, C., Loingtier, J.M., Irwin, J.: Aspect-oriented programming. In: Akşit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol. 1241, pp. 220-242. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1241
, pp. 220-242
-
-
Kiczales, G.1
Lamping, J.2
Menhdhekar, A.3
Maeda, C.4
Lopes, C.5
Loingtier, J.M.6
Irwin, J.7
-
11
-
-
82955230066
-
An overview of aspect J
-
Knudsen, J.L, ed, ECOOP 2001, Springer, Heidelberg
-
Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.: An overview of aspect J. In: Knudsen, J.L. (ed.) ECOOP 2001. LNCS, vol. 2072, p. 327. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2072
, pp. 327
-
-
Kiczales, G.1
Hilsdale, E.2
Hugunin, J.3
Kersten, M.4
Palm, J.5
Griswold, W.6
-
12
-
-
0017472779
-
Proving the correctness of multiprocess programs
-
Lamport, L.: Proving the correctness of multiprocess programs. IEEE Transactions of Software Engineering 3(2), 125-143 (1977)
-
(1977)
IEEE Transactions of Software Engineering
, vol.3
, Issue.2
, pp. 125-143
-
-
Lamport, L.1
-
13
-
-
70350405846
-
-
Hamlen, K., Morrisett, G., Schneider, F.: Computability classes for enforcement mechanisms. Technical Report TR2003-1908, Cornell University (2003); To appear in ACM Transactions on Programming Languages and Systems
-
Hamlen, K., Morrisett, G., Schneider, F.: Computability classes for enforcement mechanisms. Technical Report TR2003-1908, Cornell University (2003); To appear in ACM Transactions on Programming Languages and Systems
-
-
-
-
14
-
-
0030685617
-
-
Necula, G.C.: Proof-carrying code. In: Conference Record of POPL 1997: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, January 1997, pp. 106-119 (1997)
-
Necula, G.C.: Proof-carrying code. In: Conference Record of POPL 1997: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, January 1997, pp. 106-119 (1997)
-
-
-
|