-
2
-
-
77954582844
-
-
D. Crockford. ADsafe. http://www.adsafe.org.
-
-
-
Crockford, D.1
-
3
-
-
77954614668
-
-
Edgewall Software. Genshi. http://genshi.edgewall.org.
-
Genshi
-
-
-
4
-
-
0007935332
-
KeyKOS architecture
-
N. Hardy. KeyKOS architecture. SIGOPS Oper. Syst. Rev., 19(4):8-25, 1985.
-
(1985)
SIGOPS Oper. Syst. Rev.
, vol.19
, Issue.4
, pp. 8-25
-
-
Hardy, N.1
-
5
-
-
85084164107
-
Implementing multiple protection domains in Java
-
C. Hawblitzel, C.-c. Chang, G. Czajkowski, D. Hu, and T. Von Eicken. Implementing multiple protection domains in Java. In USENIX Annual Technical Conference, 1998.
-
USENIX Annual Technical Conference, 1998
-
-
Hawblitzel, C.1
Chang, C.-C.2
Czajkowski, G.3
Hu, D.4
Von Eicken, T.5
-
6
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
Y. W. Huang, F. Yu, C. Hang, C. H. Tsai, D. T. Lee, and S. Y. Kuo. Securing web application code by static analysis and runtime protection. In 13th International World Wide Web Conference, 2004.
-
13th International World Wide Web Conference, 2004
-
-
Huang, Y.W.1
Yu, F.2
Hang, C.3
Tsai, C.H.4
Lee, D.T.5
Kuo, S.Y.6
-
7
-
-
33751027156
-
Pixy: A static analysis tool for detecting web application vulnerabilities
-
(short paper)
-
N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In IEEE Symposium on Security & Privacy, pages 258-263, 2006.
-
(2006)
IEEE Symposium on Security & Privacy
, pp. 258-263
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
12
-
-
34547636298
-
-
PhD thesis, Johns Hopkins University, Baltimore, Maryland, USA, May
-
M. S. Miller. Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control. PhD thesis, Johns Hopkins University, Baltimore, Maryland, USA, May 2006.
-
(2006)
Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control
-
-
Miller, M.S.1
-
13
-
-
70349127409
-
-
M. S. Miller, M. Samuel, B. Laurie, I. Awad, and M. Stay. Caja: Safe active content in sanitized JavaScript (draft), 2008. http://google-caja. googlecode.com/files/caja-spec-2008-06-07.pdf.
-
(2008)
Caja: Safe Active Content in Sanitized JavaScript (Draft)
-
-
Miller, M.S.1
Samuel, M.2
Laurie, B.3
Awad, I.4
Stay, M.5
-
14
-
-
0015561577
-
Protection in programming languages
-
J. H. Morris, Jr. Protection in programming languages. Commun. ACM, 16(1):15-21, 1973.
-
(1973)
Commun. ACM
, vol.16
, Issue.1
, pp. 15-21
-
-
Morris Jr., J.H.1
-
16
-
-
85048404745
-
Preventing privilege escalation
-
N. Provos. Preventing privilege escalation. In 12th USENIX Security Symposium, pages 231-242, 2003.
-
(2003)
12th USENIX Security Symposium
, pp. 231-242
-
-
Provos, N.1
-
17
-
-
12844262011
-
A security kernel based on the lambda-calculus
-
J. A. Rees. A security kernel based on the lambda-calculus. A. I. Memo 1564, MIT, 1564, 1996.
-
(1996)
A. I. Memo 1564, MIT
, vol.1564
-
-
Rees, J.A.1
-
21
-
-
34748920594
-
-
The Open Web Application Security Project, September
-
A. Wiesmann, A. van der Stock, M. Curphey, and R. Stirbei, editors. A Guide to Building Secure Web Applications. The Open Web Application Security Project, September 2005.
-
(2005)
A Guide to Building Secure Web Applications
-
-
Wiesmann, A.1
Van Der Stock, A.2
Curphey, M.3
Stirbei, R.4
|