-
1
-
-
78649765530
-
-
www.cs.wayne.edu/~mabianto/cryptodb/2010.
-
(2010)
-
-
-
2
-
-
72249099455
-
Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations
-
M. Abi-Antoun and J. Aldrich. Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations. In OOPSLA, 2009.
-
(2009)
OOPSLA
-
-
Abi-Antoun, M.1
Aldrich, J.2
-
5
-
-
77951490166
-
Checking threat modeling data flow diagrams for implementation conformance and security
-
Short paper/poster
-
M. Abi-Antoun, D. Wang, and P. Torr. Checking threat modeling data flow diagrams for implementation conformance and security. In ASE, pages 393-396, 2007. Short paper/poster.
-
(2007)
ASE
, pp. 393-396
-
-
Abi-Antoun, M.1
Wang, D.2
Torr, P.3
-
6
-
-
26444441752
-
Ownership domains: Separating aliasing policy from mechanism
-
J. Aldrich and C. Chambers. Ownership domains: Separating aliasing policy from mechanism. In ECOOP, 2004.
-
(2004)
ECOOP
-
-
Aldrich, J.1
Chambers, C.2
-
7
-
-
85091966368
-
Wedge: Splitting applications into reduced-privilege compartments
-
A. Bittau, P. Marchenko, M. Handley, and B. Karp. Wedge: Splitting applications into reduced-privilege compartments. In NSDI, 2008.
-
(2008)
NSDI
-
-
Bittau, A.1
Marchenko, P.2
Handley, M.3
Karp, B.4
-
9
-
-
78649799139
-
-
CORAS. http://coras.sourceforge.net, 2006.
-
(2006)
CORAS
-
-
-
10
-
-
0141502155
-
An approach for modeling and analysis of security system architectures
-
Y. Deng, J. Wang, J. J. P. Tsai, and K. Beznosov. An approach for modeling and analysis of security system architectures. Knowledge & Data Eng., 15(5), 2003.
-
(2003)
Knowledge & Data Eng.
, vol.15
, Issue.5
-
-
Deng, Y.1
Wang, J.2
Tsai, J.J.P.3
Beznosov, K.4
-
11
-
-
68949213770
-
Software architecture reconstruction: A process-oriented taxonomy
-
S. Ducasse and D. Pollet. Software architecture reconstruction: a process-oriented taxonomy. TSE, 35(4), 2009.
-
(2009)
TSE
, vol.35
, Issue.4
-
-
Ducasse, S.1
Pollet, D.2
-
12
-
-
0006029080
-
Acme: Architectural description of component-based systems
-
Cambridge Univ
-
D. Garlan, R. Monroe, and D. Wile. Acme: architectural description of component-based systems. In Component-based systems. Cambridge Univ., 2000.
-
(2000)
Component-based Systems
-
-
Garlan, D.1
Monroe, R.2
Wile, D.3
-
13
-
-
34247099396
-
Modular checking for buffer overflows in the large
-
B. Hackett et al. Modular checking for buffer overflows in the large. In ICSE, 2006.
-
(2006)
ICSE
-
-
Hackett, B.1
-
14
-
-
33746885451
-
Using SCL to specify and check design intent in source code
-
H. J. Hoover and D. Hou. Using SCL to specify and check design intent in source code. TSE, 32(6), 2006.
-
(2006)
TSE
, vol.32
, Issue.6
-
-
Hoover, H.J.1
Hou, D.2
-
17
-
-
0035249574
-
Lightweight extraction of object models from bytecode
-
D. Jackson and A. Waingold. Lightweight extraction of object models from bytecode. TSE, 27(2), 2001.
-
(2001)
TSE
, vol.27
, Issue.2
-
-
Jackson, D.1
Waingold, A.2
-
19
-
-
77952398976
-
-
Addison-Wesley, Code at
-
K. Kenan. Cryptography in the database. Addison-Wesley, 2006. Code at http://kevinkenan.blogs.com/downloads/cryptodb-code.zip.
-
(2006)
Cryptography in the Database
-
-
Kenan, K.1
-
20
-
-
34248525000
-
Identifying and addressing problems in object-oriented framework reuse
-
D. Kirk, M. Roper, and M. Wood. Identifying and addressing problems in object-oriented framework reuse. Empirical Softw. Eng., 12(3), 2006.
-
(2006)
Empirical Softw. Eng.
, vol.12
, Issue.3
-
-
Kirk, D.1
Roper, M.2
Wood, M.3
-
21
-
-
34547169524
-
A comparison of static architecture compliance checking approaches
-
J. Knodel and D. Popescu. A comparison of static architecture compliance checking approaches. In WICSA, 2007.
-
(2007)
WICSA
-
-
Knodel, J.1
Popescu, D.2
-
22
-
-
78649771512
-
Architecture reconstruction: Tutorial on reverse engineering to the architectural level
-
R. Koschke. Architecture reconstruction: Tutorial on reverse engineering to the architectural level. In Intl. Summer School on Software Engineering, 2008.
-
(2008)
Intl. Summer School on Software Engineering
-
-
Koschke, R.1
-
23
-
-
57749192483
-
Information flow control for standard OS abstractions
-
M. Krohn et al. Information flow control for standard OS abstractions. In SOSP, 2007.
-
(2007)
SOSP
-
-
Krohn, M.1
-
24
-
-
0242655790
-
SecureUML: A UML-based modeling language for model-driven security
-
T. Lodderstedt, D. A. Basin, and J. Doser. SecureUML: A UML-based modeling language for model-driven security. In UML, 2002.
-
(2002)
UML
-
-
Lodderstedt, T.1
Basin, D.A.2
Doser, J.3
-
25
-
-
0029373110
-
An event-based architecture definition language
-
D. C. Luckham and J. Vera. An event-based architecture definition language. TSE, 21(9), 1995.
-
(1995)
TSE
, vol.21
, Issue.9
-
-
Luckham, D.C.1
Vera, J.2
-
26
-
-
67349241496
-
-
Microsoft threat modeling tool. http://msdn.microsoft.com/en-us/security/ sdl-threat-modeling-tool.aspx, 2007.
-
(2007)
Microsoft Threat Modeling Tool
-
-
-
27
-
-
13844296853
-
Parameterized object sensitivity for points-to analysis for Java
-
A. Milanova, A. Rountev, and B. G. Ryder. Parameterized object sensitivity for points-to analysis for Java. TOSEM, 14(1), 2005.
-
(2005)
TOSEM
, vol.14
, Issue.1
-
-
Milanova, A.1
Rountev, A.2
Ryder, B.G.3
-
31
-
-
0035308156
-
Software reflexion models: Bridging the gap between design and implementation
-
G. C. Murphy, D. Notkin, and K. J. Sullivan. Software reflexion models: Bridging the gap between design and implementation. TSE, 27(4), 2001.
-
(2001)
TSE
, vol.27
, Issue.4
-
-
Murphy, G.C.1
Notkin, D.2
Sullivan, K.J.3
-
32
-
-
0032646625
-
JFlow: Practical mostly-static information flow control
-
A. C. Myers. JFlow: Practical mostly-static information flow control. In POPL, 1999.
-
(1999)
POPL
-
-
Myers, A.C.1
-
33
-
-
0032684782
-
Parametric shape analysis via 3-valued logic
-
M. Sagiv, T. Reps, and R. Wilhelm. Parametric shape analysis via 3-valued logic. In POPL, 1999.
-
(1999)
POPL
-
-
Sagiv, M.1
Reps, T.2
Wilhelm, R.3
-
34
-
-
33947144602
-
Discovering architectures from running systems
-
B. Schmerl, J. Aldrich, D. Garlan, R. Kazman, and H. Yan. Discovering architectures from running systems. TSE, 32(7), 2006.
-
(2006)
TSE
, vol.32
, Issue.7
-
-
Schmerl, B.1
Aldrich, J.2
Garlan, D.3
Kazman, R.4
Yan, H.5
-
35
-
-
39049094497
-
Monitoring compliance of a software system with its high-level design models
-
M. Sefika, A. Sane, and R. H. Campbell. Monitoring compliance of a software system with its high-level design models. In ICSE, 1996.
-
(1996)
ICSE
-
-
Sefika, M.1
Sane, A.2
Campbell, R.H.3
-
38
-
-
27644580707
-
Demystifying the threat-modeling process
-
P. Torr. Demystifying the threat-modeling process. IEEE Security & Privacy, 3(5), 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.5
-
-
Torr, P.1
-
39
-
-
85094632142
-
Securing distributed systems with information flow control
-
N. Zeldovich, S. Boyd-Wickizer, and D. Mazières. Securing distributed systems with information flow control. In NSDI, 2008.
-
(2008)
NSDI
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Mazières, D.3
|