-
1
-
-
78651467191
-
-
Apache WSS4J, http://ws.apache.org/wss4j/, 2008
-
(2008)
Apache WSS4J
-
-
-
2
-
-
78651442999
-
-
Axis2 Architecture Guide, http://ws.apache.org/axis2/1_0/Axis2 ArchitectureGuide.html, 2008
-
(2008)
Axis2 Architecture Guide
-
-
-
3
-
-
0003400251
-
Secure Computer Systems: Unified Exposition and MULTICS Interpretation
-
MITRE Corp
-
D.E. Bell and L.J. La Padula, Secure Computer Systems: Unified Exposition and MULTICS Interpretation. MITRE Corp., 1976
-
(1976)
-
-
Bell, D.E.1
La Padula, L.J.2
-
5
-
-
85008045826
-
-
JavaNCSS, http://www.kclee.de/clemens/java/javancss/, 2008
-
(2008)
JavaNCSS
-
-
-
8
-
-
85008055617
-
-
RUBiS, http://rubis.objectweb.org/index.html, 2008
-
(2008)
RUBiS
-
-
-
10
-
-
85008066776
-
Secunia, Microsoft, NET Framework 1.x—Vulnerability Report
-
Secunia, Microsoft, NET Framework 1.x—Vulnerability Report, http://secunia.com/product/667/?task=advisories, 2008
-
(2008)
-
-
-
11
-
-
85008066830
-
-
Trusted Computing Group, https://www.trustedcomputinggroup.org/home, 2008
-
(2008)
-
-
-
15
-
-
84957043394
-
An Efficient Component Model for the Construction of Adaptive Middleware
-
M. Clarke, G.S. Blair, G. Coulson, and N. Parlavantzas, “An Efficient Component Model for the Construction of Adaptive Middleware,” Proc. IFIP/ACM Int'l Conf. Distributed Systems and Open Distributed Processing (Middleware '01), pp. 160–178, 2001
-
(2001)
Proc. IFIP/ACM Int'l Conf. Distributed Systems and Open Distributed Processing (Middleware '01)
, pp. 160-178
-
-
Clarke, M.1
Blair, G.S.2
Coulson, G.3
Parlavantzas, N.4
-
18
-
-
0036041420
-
Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code
-
Oct
-
D. Engler, D. Chen, S. Hallem, A. Chou, and B. Chelf, “Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code,” Proc. 18th ACM Symp. Operating Systems Principles (SOSP '01), Oct. 2001
-
(2001)
Proc. 18th ACM Symp. Operating Systems Principles (SOSP '01)
-
-
Engler, D.1
Chen, D.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
19
-
-
77951450625
-
Reducing TCB Size by Using Untrusted Components—Small Kernels versus Virtual Machine Monitors
-
M. Hohmuth, M. Peter, H. Härtig, and J. Shapiro, “Reducing TCB Size by Using Untrusted Components—Small Kernels versus Virtual Machine Monitors,” Proc. 11th Workshop ACM SIGOPS European Workshop (EW), 2004
-
(2004)
Proc. 11th Workshop ACM SIGOPS European Workshop (EW)
-
-
Hohmuth, M.1
Peter, M.2
Härtig, H.3
Shapiro, J.4
-
21
-
-
78651426918
-
Protected Data Paths: Delivering Sensitive Data via Untrusted Proxies
-
Oct
-
J. Kong, K. Schwan, and P. Widener, “Protected Data Paths: Delivering Sensitive Data via Untrusted Proxies,” Proc. Fourth Int'l Conf. Privacy, Security and Trust (PST '06), Oct. 2006
-
(2006)
Proc. Fourth Int'l Conf. Privacy, Security and Trust (PST '06)
-
-
Kong, J.1
Schwan, K.2
Widener, P.3
-
22
-
-
0017291489
-
A Complexity Measure
-
Dec
-
T.J. McCabe, “A Complexity Measure,” IEEE Trans. Software Eng., vol. SE-2, no. 4, pp. 308–320, Dec. 1976
-
(1976)
IEEE Trans. Software Eng
, vol.SE-2
, Issue.4
, pp. 308-320
-
-
McCabe, T.J.1
-
24
-
-
38949205195
-
Axis2, Middleware for Next Generation Web Services
-
Sept
-
S. Perera et al., “Axis2, Middleware for Next Generation Web Services,” Proc. IEEE Int'l Conf. Web Services (ICWS '06), pp. 833–840, Sept. 2006
-
(2006)
Proc. IEEE Int'l Conf. Web Services (ICWS '06)
, pp. 833-840
-
-
Perera, S.1
-
25
-
-
0037251378
-
Language-Based Information-Flow Security
-
Jan
-
A. Sabelfeld and A.C. Myers, “Language-Based Information-Flow Security,” IEEE J. Selected Areas in Comm., vol. 21, no. 1, pp. 5–19, Jan. 2003
-
(2003)
IEEE J. Selected Areas in Comm
, vol.21
, Issue.1
, pp. 5-19
-
-
Sabelfeld, A.1
Myers, A.C.2
-
26
-
-
85084162270
-
Design and Implementation of a TCG-Based Integrity Measurement Architecture
-
R. Sailer, X. Zhang, T. Jaeger, and L.V. Doorn, “Design and Implementation of a TCG-Based Integrity Measurement Architecture,” Proc. 13th USENIX Security Symp. (Security '04), pp. 223–238, 2004
-
(2004)
Proc. 13th USENIX Security Symp. (Security '04)
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Doorn, L.V.4
-
27
-
-
0016555241
-
The Protection of Information in Computer Systems
-
Sept
-
J.H. Saltzer and M.D. Schroeder, “The Protection of Information in Computer Systems,” Proc. IEEE, vol. 63, no. 9, pp. 1278–1308, Sept. 1975
-
(1975)
Proc. IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
28
-
-
84855723153
-
Reducing TCB Complexity for Security-Sensitive Applications: Three Case Studies
-
Apr
-
L. Singaravelu, C. Pu, H. Haertig, and C. Helmuth, “Reducing TCB Complexity for Security-Sensitive Applications: Three Case Studies,” Proc. First ACM SIGOPS/EuroSys European Conf. Computer Systems (EuroSys '06), Apr. 2006
-
(2006)
Proc. First ACM SIGOPS/EuroSys European Conf. Computer Systems (EuroSys '06)
-
-
Singaravelu, L.1
Pu, C.2
Haertig, H.3
Helmuth, C.4
-
31
-
-
85081874807
-
A First Step towards Automated Detection of Buffer Overrun Vulnerabilities
-
D. Wagner, J. Foster, E. Brewer, and A. Aiken, “A First Step towards Automated Detection of Buffer Overrun Vulnerabilities,” Proc. ISOC Network and Distributed System Security Symp. (NDSS), 2000
-
(2000)
Proc. ISOC Network and Distributed System Security Symp. (NDSS)
-
-
Wagner, D.1
Foster, J.2
Brewer, E.3
Aiken, A.4
-
32
-
-
0016069660
-
HYDRA: The Kernel of a Multiprocessor Operating System
-
June
-
W. Wulf, E. Cohen, W. Corwin, A. Jones, R. Levin, C. Pierson, and F. Pollack, “HYDRA: The Kernel of a Multiprocessor Operating System,” Comm. ACM, vol. 17, no. 6, pp. 337–345, June 1974
-
(1974)
Comm. ACM
, vol.17
, Issue.6
, pp. 337-345
-
-
Wulf, W.1
Cohen, E.2
Corwin, W.3
Jones, A.4
Levin, R.5
Pierson, C.6
Pollack, F.7
-
33
-
-
33749064387
-
WS-Attestation: Efficient and Fine-Grained Remote Attestation on Web Services
-
S. Yoshihama, T. Ebringer, M. Nakamura, S. Munetoh, and H. Maruyama, “WS-Attestation: Efficient and Fine-Grained Remote Attestation on Web Services,” Proc. IEEE Third Int'l Conf. Web Services (ICWS '05), pp. 743–750, 2005
-
(2005)
Proc. IEEE Third Int'l Conf. Web Services (ICWS '05)
, pp. 743-750
-
-
Yoshihama, S.1
Ebringer, T.2
Nakamura, M.3
Munetoh, S.4
Maruyama, H.5
-
34
-
-
0347527091
-
Refactoring Middleware with Aspects
-
C. Zhang and H.-A. Jacobsen, “Refactoring Middleware with Aspects,” IEEE Trans. Parallel and Distributed Systems, vol. 14, no. 11, pp. 1058–1073, 2003
-
(2003)
IEEE Trans. Parallel and Distributed Systems
, vol.14
, Issue.11
, pp. 1058-1073
-
-
Zhang, C.1
Jacobsen, H.-A.2
-
35
-
-
17044418116
-
Resolving Feature Convolution with Horizontal Decomposition in Middleware
-
C. Zhang and H.-A. Jacobsen, “Resolving Feature Convolution with Horizontal Decomposition in Middleware,” Proc. 19th Ann. ACM SIGPLAN Conf. Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA '04), pp. 188–205, 2004
-
(2004)
Proc. 19th Ann. ACM SIGPLAN Conf. Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA '04)
, pp. 188-205
-
-
Zhang, C.1
Jacobsen, H.-A.2
|