-
2
-
-
33745329295
-
Computability classes for enforcement mechanisms
-
Hamlen, K.W., Morrisett, G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM Transactions on Programming Languages and Systems (TOPLAS) 28(1), 175-205 (2006)
-
(2006)
ACM Transactions on Programming Languages and Systems (TOPLAS)
, vol.28
, Issue.1
, pp. 175-205
-
-
Hamlen, K.W.1
Morrisett, G.2
Schneider, F.B.3
-
3
-
-
14844332191
-
More enforceable security policies
-
Bauer, L., Ligatti, J., Walker, D.: More enforceable security policies. In: Proceedings of the Foundations of Computer Security Workshop, Copenhagen, Denmark (July 2002)
-
Proceedings of the Foundations of Computer Security Workshop, Copenhagen, Denmark (July 2002)
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
4
-
-
30844442322
-
Infinite Words
-
ser. Elsevier, Amsterdam
-
Perrin, D., Pin, J.-É.: Infinite Words, ser. Pure and Applied Mathematics, vol. 141. Elsevier, Amsterdam (2004)
-
(2004)
Pure and Applied Mathematics
, vol.141
-
-
Perrin, D.1
Pin, J.-É.2
-
7
-
-
0004072686
-
-
Addison- Wesley, Reading
-
Aho, A.V., Sethi, R., Ullman, J.D.: Compilers, Principles, Techniques, and Tools. Addison- Wesley, Reading (1986)
-
(1986)
Compilers, Principles, Techniques, and Tools
-
-
Aho, A.V.1
Sethi, R.2
Ullman, J.D.3
-
8
-
-
35348951470
-
The software model checker BLAST: Applications to software engineering
-
Beyer, D., Henzinger, T.A., Jhala, R., Majumdar, R.: The software model checker BLAST: Applications to software engineering. International Journal on Software Tools for Technology Transfer (STTT) 9(5-6), 505-525 (2007)
-
(2007)
International Journal on Software Tools for Technology Transfer (STTT)
, vol.9
, Issue.5-6
, pp. 505-525
-
-
Beyer, D.1
Henzinger, T.A.2
Jhala, R.3
Majumdar, R.4
-
10
-
-
33646066871
-
Enforcing non-safety security policies with program monitors
-
di de Vimercati, S.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. Springer, Heidelberg
-
Ligatti, J., Bauer, L., Walker, D.: Enforcing non-safety security policies with program monitors. In: di de Vimercati, S.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 355-373. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3679
, pp. 355-373
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
12
-
-
40149091526
-
Execution monitoring enforcement under memory-limitations constraints
-
Talhi, C., Tawbi, N., Debbabi, M.: Execution monitoring enforcement under memory-limitations constraints. Information and Computation 206(1), 158-184 (2008)
-
(2008)
Information and Computation
, vol.206
, Issue.1
, pp. 158-184
-
-
Talhi, C.1
Tawbi, N.2
Debbabi, M.3
-
13
-
-
85016422463
-
Monitoring of real-time properties
-
Arun-Kumar, S., Garg, N. (eds.) FSTTCS 2006. Springer, Heidelberg
-
Bauer, A., Leucker, M., Schallhart, C.: Monitoring of real-time properties. In: Arun-Kumar, S., Garg, N. (eds.) FSTTCS 2006. LNCS, vol. 4337, pp. 260-272. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4337
, pp. 260-272
-
-
Bauer, A.1
Leucker, M.2
Schallhart, C.3
-
17
-
-
1842638523
-
Java-mac: A run-time assurance approach for java programs
-
Kim, M., Viswanathan, M., Kannan, S., Lee, I., Sokolsky, O.: Java-mac: A run-time assurance approach for java programs. Formal Methods in Systems Design 24(2), 129-155 (2004)
-
(2004)
Formal Methods in Systems Design
, vol.24
, Issue.2
, pp. 129-155
-
-
Kim, M.1
Viswanathan, M.2
Kannan, S.3
Lee, I.4
Sokolsky, O.5
-
18
-
-
0003311357
-
Runtime assurance based on formal specifications
-
Lee, I., Kannan, S., Kim, M., Sokolsky, O., Viswanathan, M.: Runtime assurance based on formal specifications. In: Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (1999)
-
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (1999)
-
-
Lee, I.1
Kannan, S.2
Kim, M.3
Sokolsky, O.4
Viswanathan, M.5
-
19
-
-
0033749789
-
Steering of real-time systems based on monitoring and checking
-
IEEE Computer Society, Washington
-
Sokolsky, O., Kannan, S., Kim, M., Lee, I., Viswanathan, M.: Steering of real-time systems based on monitoring and checking. In: Proceedings of the Fifth International Workshop on Object-Oriented Real-Time Dependable Systems, WORDS 1999, p. 11. IEEE Computer Society, Washington (1999)
-
(1999)
Proceedings of the Fifth International Workshop on Object-Oriented Real-Time Dependable Systems, WORDS 1999
, pp. 11
-
-
Sokolsky, O.1
Kannan, S.2
Kim, M.3
Lee, I.4
Viswanathan, M.5
-
20
-
-
24944483574
-
-
Ph.D. dissertation, Cornell University, Ithaca, NY, USA
-
Erlingsson, U.: The inlined reference monitor approach to security policy enforcement. Ph.D. dissertation, Cornell University, Ithaca, NY, USA (2004)
-
(2004)
The Inlined Reference Monitor Approach to Security Policy Enforcement
-
-
Erlingsson, U.1
-
21
-
-
0001790593
-
Depth-first search and linear graph algorithms
-
Tarjan, R.E.: Depth-first search and linear graph algorithms. SIAM Journal on Computing 1(2), 146-160 (1972)
-
(1972)
SIAM Journal on Computing
, vol.1
, Issue.2
, pp. 146-160
-
-
Tarjan, R.E.1
|