-
2
-
-
70349735505
-
-
The SANS Institute, Anonymous
-
Anonymous. Sans top-20 2007 security risks. http://www.sans.org/top20/, The SANS Institute, 2007.
-
(2007)
Sans top-20 2007 security risks
-
-
-
3
-
-
70450274574
-
-
Anonymous. Java International FAQ. http://java.sun.com/javase/ technologies/core/basic/intl/faq.jsp, 09 2008.
-
Anonymous. Java International FAQ. http://java.sun.com/javase/ technologies/core/basic/intl/faq.jsp, 09 2008.
-
-
-
-
4
-
-
33746357234
-
Using aspects for security engineering of web service compositions
-
Washington, DC, USA, IEEE Computer Society
-
A. Charfi and M. Mezini. Using aspects for security engineering of web service compositions. In Proceedings of the IEEE International Conference on Web Services, pages 59-66, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
Proceedings of the IEEE International Conference on Web Services
, pp. 59-66
-
-
Charfi, A.1
Mezini, M.2
-
5
-
-
70450276255
-
-
R. Elz and R. Bush. Clarifications to the DNS Specification. http://www.ietf.org/rfc/rfc2181.txt, 07 1997.
-
R. Elz and R. Bush. Clarifications to the DNS Specification. http://www.ietf.org/rfc/rfc2181.txt, 07 1997.
-
-
-
-
6
-
-
60849109638
-
Applying Aspect-Orientation in Designing Security Systems: A Case Study
-
S. Gao, Y. Deng, H. Yu, X. He, K. Beznosov, and K. Cooper. Applying Aspect-Orientation in Designing Security Systems: A Case Study. In The Sixteenth International Conference on Software Engineering and Knowledge Engineering, 2004.
-
(2004)
The Sixteenth International Conference on Software Engineering and Knowledge Engineering
-
-
Gao, S.1
Deng, Y.2
Yu, H.3
He, X.4
Beznosov, K.5
Cooper, K.6
-
7
-
-
5744229775
-
Deriving security requirements from crosscutting threat descriptions
-
New York, NY, USA, ACM
-
C. B. Haley, R. C. Laney, and B. Nuseibeh. Deriving security requirements from crosscutting threat descriptions. In Proceedings of the 3rd international conference on Aspect-oriented software development, pages 112-121, New York, NY, USA, 2004. ACM.
-
(2004)
Proceedings of the 3rd international conference on Aspect-oriented software development
, pp. 112-121
-
-
Haley, C.B.1
Laney, R.C.2
Nuseibeh, B.3
-
8
-
-
85084164107
-
Implementing Multiple Protection Domains in Java
-
C. Hawblitzel, C.-C. Chang, G. Czajkowski, D. Hu, and T. von Eicken. Implementing Multiple Protection Domains in Java. In Proceedings of the 1998 USENIX Annual Technical Conference, 1998.
-
(1998)
Proceedings of the 1998 USENIX Annual Technical Conference
-
-
Hawblitzel, C.1
Chang, C.-C.2
Czajkowski, G.3
Hu, D.4
von Eicken, T.5
-
10
-
-
70450234565
-
POLA Today Keeps the Virus at Bay
-
Technical Report HPL-2003-191, HP Laboratories Palo Alto
-
A. H. Karp. POLA Today Keeps the Virus at Bay. Technical Report HPL-2003-191, HP Laboratories Palo Alto, 2003.
-
(2003)
-
-
Karp, A.H.1
-
11
-
-
0000758969
-
An Overview of AspectJ
-
G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W. G. Griswold. An Overview of AspectJ. In Proceedings of the 15th European Conference on Object-Oriented Programming, 2001.
-
(2001)
Proceedings of the 15th European Conference on Object-Oriented Programming
-
-
Kiczales, G.1
Hilsdale, E.2
Hugunin, J.3
Kersten, M.4
Palm, J.5
Griswold, W.G.6
-
12
-
-
0038108908
-
Access rights analysis for Java
-
L. Koved, M. Pistoia, and A. Kershenbaum. Access rights analysis for Java. In Proceedings of the 17th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications, 2002.
-
(2002)
Proceedings of the 17th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications
-
-
Koved, L.1
Pistoia, M.2
Kershenbaum, A.3
-
15
-
-
70450262854
-
Paradigm Regained: Abstraction Mechanisms for Access Control
-
M. S. Miller and J. S. Shapiro. Paradigm Regained: Abstraction Mechanisms for Access Control. In Asian Computing Conference, 2003.
-
(2003)
Asian Computing Conference
-
-
Miller, M.S.1
Shapiro, J.S.2
-
16
-
-
58049134438
-
A High-level Aspect-oriented-based Framework for Software Security Hardening
-
A. Mourad, M.-A. Laverdiére, and M. Debbabi. A High-level Aspect-oriented-based Framework for Software Security Hardening. Information Security Journal: A Global Perspective, 17(2):56-74, 2008.
-
(2008)
Information Security Journal: A Global Perspective
, vol.17
, Issue.2
, pp. 56-74
-
-
Mourad, A.1
Laverdiére, M.-A.2
Debbabi, M.3
-
20
-
-
36949035567
-
Aclamate: An aosd security framework for access control
-
Washington, DC, USA, IEEE Computer Society
-
A. Prunicki and T. Elrad. Aclamate: An aosd security framework for access control. In Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, pages 293-300, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
, pp. 293-300
-
-
Prunicki, A.1
Elrad, T.2
-
21
-
-
19944423977
-
The Protection of Information in Computer Systems
-
J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. In Communications of the ACM, volume 17, 7, 1974.
-
(1974)
Communications of the ACM
, vol.17
, pp. 7
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
22
-
-
33646185580
-
Polaris: Virus Safe Computing for Windows XP
-
Technical Report HP:-2004-221, HP Laboratories Palo Alto
-
M. Stiegler, A. H. Karp, K.-P. Yee, and M. S. Miller. Polaris: Virus Safe Computing for Windows XP. Technical Report HP:-2004-221, HP Laboratories Palo Alto, 2004.
-
(2004)
-
-
Stiegler, M.1
Karp, A.H.2
Yee, K.-P.3
Miller, M.S.4
-
23
-
-
33745947009
-
Object Capabilities for Security. Invited Talk
-
June
-
D. Wagner. Object Capabilities for Security. Invited Talk, PLAS 2006, June 2006.
-
(2006)
PLAS
-
-
Wagner, D.1
-
24
-
-
20344372701
-
Implementing protocols via declarative event patterns
-
R. J. Walker and K. Viggers. Implementing protocols via declarative event patterns. In SIGSOFT FSE, pages 159-169, 2004.
-
(2004)
SIGSOFT FSE
, pp. 159-169
-
-
Walker, R.J.1
Viggers, K.2
-
25
-
-
70450272146
-
Report of the AOSD2004 workshop on AOSD technology for application-level security
-
Technical report, Department of Computer Science, K.U. Leuven, Leuven, Belgium
-
B. D. Win, V. Shah, W. Joosen, and R. Bodkin. Report of the AOSD2004 workshop on AOSD technology for application-level security. Technical report, Department of Computer Science, K.U. Leuven, Leuven, Belgium, 2005.
-
(2005)
-
-
Win, B.D.1
Shah, V.2
Joosen, W.3
Bodkin, R.4
-
28
-
-
37349031376
-
-
Z. J. Zhu and M. Zulkernine. Towards an Aspect-Oriented Intrusion Detection Framework. In COMPSAC '07: Proceedings of the 31st Annual International Computer Software and Applications Conference, 1, pages 637-638. IEEE Computer Society, 2007
-
Z. J. Zhu and M. Zulkernine. Towards an Aspect-Oriented Intrusion Detection Framework. In COMPSAC '07: Proceedings of the 31st Annual International Computer Software and Applications Conference - Vol. 1, pages 637-638. IEEE Computer Society, 2007.
-
-
-
|