-
1
-
-
31844457357
-
Composing security policies with polymer
-
ACM Press, New York
-
Bauer, L., Ligatti, J., Walker, D.: Composing security policies with polymer. In: Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, pp. 305-314. ACM Press, New York (2005).
-
(2005)
Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation
, pp. 305-314
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
2
-
-
13444275220
-
Edit automata: enforcement mechanisms for run-time security policies
-
Bauer L., Ligatti J., Walker D.: Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur. 4(1-2), 2-16 (2005).
-
(2005)
Int. J. Inf. Secur.
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
3
-
-
67349233081
-
Matching in security-by-contract for mobile code
-
Bielova N., Dragoni N., Massacci F., Naliuka K., Siahaan I.: Matching in security-by-contract for mobile code. J. Log. Algebraic Programm. 78(5), 340-358 (2009).
-
(2009)
J. Log. Algebraic Programm.
, vol.78
, Issue.5
, pp. 340-358
-
-
Bielova, N.1
Dragoni, N.2
Massacci, F.3
Naliuka, K.4
Siahaan, I.5
-
4
-
-
67650694003
-
Do you really mean what you actually enforced?
-
Springer, Heidelberg
-
Bielova, N., Massacci, F.: Do you really mean what you actually enforced? In: Proceedings of the 5th International Workshop on Formal Aspects in Security and Trust, vol. 5491, pp. 287-301. Springer, Heidelberg (2008).
-
(2008)
Proceedings of the 5th International Workshop on Formal Aspects in Security and Trust
, vol.5491
, pp. 287-301
-
-
Bielova, N.1
Massacci, F.2
-
5
-
-
78649245628
-
Towards practical enforcement theories
-
Lecture Notes in Computer Science Springer, Heidelberg
-
Bielova, N., Massacci, F., Micheletti, A.: Towards practical enforcement theories. In: Proceedings of The 14th Nordic Conference on Secure IT Systems. Lecture Notes in Computer Science, vol. 5838, pp. 239-254. Springer, Heidelberg (2009).
-
(2009)
Proceedings of The 14th Nordic Conference on Secure IT Systems
, vol.5838
, pp. 239-254
-
-
Bielova, N.1
Massacci, F.2
Micheletti, A.3
-
6
-
-
0026417031
-
QRT FIFO automata, breadth-first grammars and their relations
-
Cherubini A., Citrini C., Reghizzi S. C., Mandrioli D.: QRT FIFO automata, breadth-first grammars and their relations. Theor. Comput. Sci. 85(1), 171-203 (1991).
-
(1991)
Theor. Comput. Sci.
, vol.85
, Issue.1
, pp. 171-203
-
-
Cherubini, A.1
Citrini, C.2
Reghizzi, S.C.3
Mandrioli, D.4
-
7
-
-
80051668536
-
-
CNET Networks: Channel 4's 4od: Tv on demand, at a price. Crave Webzine
-
CNET Networks: Channel 4's 4od: Tv on demand, at a price. Crave Webzine (2007).
-
(2007)
-
-
-
16
-
-
34250832098
-
Through modeling to synthesis of security automata
-
Elsevier Science Publishers B. V
-
Martinelli, F., Matteucci, I.: Through modeling to synthesis of security automata. In: Proceedings of the Second International Workshop on Security and Trust Management, Electronic Notes in Theoretical Computer Science, vol. 179, pp. 31-46. Elsevier Science Publishers B. V. (2007).
-
(2007)
Proceedings of the Second International Workshop on Security and Trust Management, Electronic Notes in Theoretical Computer Science
, vol.179
, pp. 31-46
-
-
Martinelli, F.1
Matteucci, I.2
-
20
-
-
84881225236
-
Enforceable security policies
-
Schneider F.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30-50 (2000).
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.1
-
21
-
-
21644444136
-
Model-carrying code: a practical approach for safe execution of untrusted applications
-
ACM Press, New York
-
Sekar, R., Venkatakrishnan, V., Basu, S., Bhatkar, S., DuVarney, D.: Model-carrying code: a practical approach for safe execution of untrusted applications. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles, pp. 15-28. ACM Press, New York (2003).
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles
, pp. 15-28
-
-
Sekar, R.1
Venkatakrishnan, V.2
Basu, S.3
Bhatkar, S.4
DuVarney, D.5
-
22
-
-
40149091526
-
Execution monitoring enforcement under memory-limitation constraints
-
Talhi C., Tawbi N., Debbabi M.: Execution monitoring enforcement under memory-limitation constraints. Inf. Comput. 206(2-4), 158-184 (2007).
-
(2007)
Inf. Comput.
, vol.206
, Issue.2-4
, pp. 158-184
-
-
Talhi, C.1
Tawbi, N.2
Debbabi, M.3
|