메뉴 건너뛰기




Volumn , Issue , 2010, Pages 1442-1447

A study for access control flow analysis with a proposed job analyzer component based on stack inspection methodology

Author keywords

Access control; Code access security; Component; HIMAN; HIMAN ID; Information flow analysis; Intrusion detection system; Program analysis; Sandboxing; Security; Security properties; Stack inspection; Static analysis

Indexed keywords

CODE ACCESS SECURITY; COMPONENT; HIMAN; HIMAN-ID; INFORMATION FLOW ANALYSIS; INTRUSION DETECTION SYSTEM; PROGRAM ANALYSIS; SANDBOXING; SECURITY; SECURITY PROPERTIES; STACK INSPECTION;

EID: 79851496858     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISDA.2010.5687113     Document Type: Conference Paper
Times cited : (1)

References (15)
  • 1
    • 79851507240 scopus 로고    scopus 로고
    • Programming languages and program analysis for security: A three-year retrospective
    • 12 Feb
    • Pistoia, M. and Erlingsson, Ú, "Programming languages and program analysis for security: a three-year retrospective". SIGPLAN Notice, pp. 1-3, 12 Feb, 2009.
    • (2009) SIGPLAN Notice , pp. 1-3
    • Pistoia, M.1    Erlingsson, Ú.2
  • 3
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Sept
    • Jerome H. Saltzer and Michael D. Schroeder, "The Protection of Information in Computer Systems", Proceedings of the IEEE, 63(9):1278-1308, Sept, 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 4
    • 34548734722 scopus 로고    scopus 로고
    • Mining security-sensitive operations in legacy code using concept analysis
    • DOI 10.1109/ICSE.2007.54, 4222607, Proceedings - 29th International Conference on Software Engineering, ICSE 2007
    • Vinod Ganapathy, Dave King, Trent Jaeger, and Somesh Jha, "Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis", In 29th International Conference on Software Engineering(ICSE), pp458-467, Minneapolis, MN, USA, May 2007. (Pubitemid 47430680)
    • (2007) Proceedings - International Conference on Software Engineering , pp. 458-467
    • Ganapathy, V.1    King, D.2    Jaeger, T.3    Jha, S.4
  • 6
    • 50249156907 scopus 로고    scopus 로고
    • A pure peer-to-peer desktop grid framework with efficient fault tolerance
    • Nov.
    • Ali E. El-Desoky, Hisham A., Abdulrahman A. Azab, "A Pure Peer-to-Peer Desktop Grid Framework with Efficient Fault Tolerance", IEEE-ICCES 24, Nov. 2007.
    • (2007) IEEE-ICCES , vol.24
    • El-Desoky, A.E.1    Hisham, A.2    Azab, A.A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.