-
1
-
-
79851507240
-
Programming languages and program analysis for security: A three-year retrospective
-
12 Feb
-
Pistoia, M. and Erlingsson, Ú, "Programming languages and program analysis for security: a three-year retrospective". SIGPLAN Notice, pp. 1-3, 12 Feb, 2009.
-
(2009)
SIGPLAN Notice
, pp. 1-3
-
-
Pistoia, M.1
Erlingsson, Ú.2
-
2
-
-
0038108908
-
Access rights analysis for java
-
Seattle, USA, November ACM Press
-
Larry Koved, Marco Pistoia, and Aaron Kershenbaum, "Access Rights Analysis for Java", In 17th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2002), pages 359-372, Seattle, USA, November 2002, ACM Press.
-
(2002)
17th ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications (OOPSLA 2002)
, pp. 359-372
-
-
Koved, L.1
Pistoia, M.2
Kershenbaum, A.3
-
3
-
-
0016555241
-
The protection of information in computer systems
-
Sept
-
Jerome H. Saltzer and Michael D. Schroeder, "The Protection of Information in Computer Systems", Proceedings of the IEEE, 63(9):1278-1308, Sept, 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
4
-
-
34548734722
-
Mining security-sensitive operations in legacy code using concept analysis
-
DOI 10.1109/ICSE.2007.54, 4222607, Proceedings - 29th International Conference on Software Engineering, ICSE 2007
-
Vinod Ganapathy, Dave King, Trent Jaeger, and Somesh Jha, "Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis", In 29th International Conference on Software Engineering(ICSE), pp458-467, Minneapolis, MN, USA, May 2007. (Pubitemid 47430680)
-
(2007)
Proceedings - International Conference on Software Engineering
, pp. 458-467
-
-
Ganapathy, V.1
King, D.2
Jaeger, T.3
Jha, S.4
-
6
-
-
50249156907
-
A pure peer-to-peer desktop grid framework with efficient fault tolerance
-
Nov.
-
Ali E. El-Desoky, Hisham A., Abdulrahman A. Azab, "A Pure Peer-to-Peer Desktop Grid Framework with Efficient Fault Tolerance", IEEE-ICCES 24, Nov. 2007.
-
(2007)
IEEE-ICCES
, vol.24
-
-
El-Desoky, A.E.1
Hisham, A.2
Azab, A.A.3
-
8
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine, "A sound type system for secure flow analysis", Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
11
-
-
84890865854
-
Access control based on execution history
-
Abadi, M., Fournet, C, "Access Control Based on Execution History", In Proceedings of the Network and Distributed System Security Symposium Conference (NDSS), pp. 6-7, 2003.
-
(2003)
Proceedings of the Network and Distributed System Security Symposium Conference (NDSS)
, pp. 6-7
-
-
Abadi, M.1
Fournet, C.2
-
12
-
-
85134943270
-
Verification of control flow based security properties
-
T. Jensen, D. Le Métayer, T. Thorn, D. Le, Metayer T. Thorn, "Verification of control flow based security properties", In IEEE Symposium on Security and Privacy, pages(3-5, 11), 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, vol.11
, pp. 3-5
-
-
Jensen, T.1
Le Métayer, D.2
Thorn, T.3
Le, D.4
Thorn, M.T.5
-
13
-
-
18944377182
-
Static analysis for stack inspection
-
Lipari, Italy
-
Massimo Bartoletti, Pierpaolo Degano, Gianluigi Ferrari, "Static analysis for stack inspection", In Proceedings of International Workshop on Concurrency and Coordination, Electronic Notes in Theoretical Computer Science, pages 2-4, Lipari, Italy, 2001.
-
(2001)
Proceedings of International Workshop on Concurrency and Coordination, Electronic Notes in Theoretical Computer Science
, pp. 2-4
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.3
-
14
-
-
58049176423
-
Intrusion detection for computational grids
-
Alexandre Schulter, Kleber Vieira, Carols Westphal, Carla Westphal, Sekkaki Abderrahim, "Intrusion Detection for Computational Grids", conference of New Technologies, Mobility and Security (NTMS), pages 2-4, 2008.
-
(2008)
Conference of New Technologies, Mobility and Security (NTMS)
, pp. 2-4
-
-
Schulter, A.1
Vieira, K.2
Westphal, C.3
Westphal, C.4
Abderrahim, S.5
|