-
3
-
-
66849138438
-
Composing expressive runtime security policies
-
Bauer, L., Ligatti, J., Walker, D.: Composing expressive runtime security policies. ACM Transactions on Software Engineering and Methodology 18(3), 1-43 (2009)
-
(2009)
ACM Transactions on Software Engineering and Methodology
, vol.18
, Issue.3
, pp. 1-43
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
4
-
-
67649909566
-
Security policies enforcement using finite edit automata
-
Beauquier, D., Cohen, J., Lanotte, R.: Security policies enforcement using finite edit automata. Electron. Notes Theor. Comput. Sci. 229(3), 19-35 (2009)
-
(2009)
Electron. Notes Theor. Comput. Sci.
, vol.229
, Issue.3
, pp. 19-35
-
-
Beauquier, D.1
Cohen, J.2
Lanotte, R.3
-
5
-
-
84921065761
-
Security monitor inlining for multithreaded java
-
July
-
Dam, M., Jacobs, B., Lundblad, A., Piessens, F.: Security monitor inlining for multithreaded java. In: Proceedings of the European Conference on Object-Oriented Programming (ECOOP) (July 2009)
-
(2009)
Proceedings of the European Conference on Object-oriented Programming (ECOOP)
-
-
Dam, M.1
Jacobs, B.2
Lundblad, A.3
Piessens, F.4
-
9
-
-
33745329295
-
Computability classes for enforcement mechanisms
-
Hamlen, K., Morrisett, G., Schneider, F. B.: Computability classes for enforcement mechanisms. ACM Transactions on Progamming Languages and Systems 28(1), 175-205 (2006)
-
(2006)
ACM Transactions on Progamming Languages and Systems
, vol.28
, Issue.1
, pp. 175-205
-
-
Hamlen, K.1
Morrisett, G.2
Schneider, F.B.3
-
10
-
-
82955230066
-
An overview of AspectJ
-
Knudsen, J. L. ed., Springer, Heidelberg
-
Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.: An overview of AspectJ. In: Knudsen, J. L. (ed.) ECOOP 2001. LNCS, vol. 2072, p. 327. Springer, Heidelberg (2001)
-
(2001)
ECOOP 2001. LNCS
, vol.2072
, pp. 327
-
-
Kiczales, G.1
Hilsdale, E.2
Hugunin, J.3
Kersten, M.4
Palm, J.5
Griswold, W.6
-
11
-
-
33646040896
-
Computational analysis of run-time monitoring-fundamentals of Java-MaC
-
June
-
Kim, M., Kannan, S., Lee, I., Sokolsky, O., Viswantathan, M.: Computational analysis of run-time monitoring-fundamentals of Java-MaC. Run-time Verification (June 2002)
-
(2002)
Run-time Verification
-
-
Kim, M.1
Kannan, S.2
Lee, I.3
Sokolsky, O.4
Viswantathan, M.5
-
12
-
-
60349103393
-
Run-time enforcement of nonsafety policies
-
Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of nonsafety policies. ACM Transactions on Information and System Security 12(3), 1-41 (2009)
-
(2009)
ACM Transactions on Information and System Security
, vol.12
, Issue.3
, pp. 1-41
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
13
-
-
78049411430
-
A theory of runtime enforcement, with results
-
University of South Florida June
-
Ligatti, J., Reddy, S.: A theory of runtime enforcement, with results. Technical Report USF-CSE-SS-102809, University of South Florida (June 2010), http://www.cse.usf.edu/~ligatti/papers/mra-tr.pdf
-
(2010)
Technical Report USF-CSE-SS-102809
-
-
Ligatti, J.1
Reddy, S.2
-
15
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer, J., Schroeder, M.: The protection of information in computer systems. Proceedings of the IEEE 63(9), 1278-1308 (1975)
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
17
-
-
40149091526
-
Execution monitoring enforcement under memory-limitation constraints
-
Talhi, C., Tawbi, N., Debbabi, M.: Execution monitoring enforcement under memory-limitation constraints. Information and Computation 206 (2-4), 158-184 (2008)
-
(2008)
Information and Computation
, vol.206
, Issue.2-4
, pp. 158-184
-
-
Talhi, C.1
Tawbi, N.2
Debbabi, M.3
-
19
-
-
33846497980
-
Javascript instrumentation for browser security
-
Yu, D., Chander, A., Islam, N., Serikov, I.: Javascript instrumentation for browser security. In: Proceedings of the Symposium on Principles of Programming Languages, pp. 237-249 (2007)
-
(2007)
Proceedings of the Symposium on Principles of Programming Languages
, pp. 237-249
-
-
Yu, D.1
Chander, A.2
Islam, N.3
Serikov, I.4
|