-
1
-
-
14944384797
-
Security through aspect- oriented programming
-
November
-
B. De Win, B. Vanhaute and B. Decker, "Security through Aspect- Oriented Programming, " in Advances in Network and Distributed Systems Security, IFIP TC11 WG11.4 First Working Conference on Network Security, November 2001, pp.125-138.
-
(2001)
Advances in Network and Distributed Systems Security, IFIP TC11 WG11.4 First Working Conference on Network Security
, pp. 125-138
-
-
Win, B.D.1
Vanhaute, B.2
Decker, B.3
-
3
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
February
-
J. Newsome and D. Song, "Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software, " in 12th Annual Network and Distributed System Security Symposium, February 2005, pp.1-17.
-
(2005)
12th Annual Network and Distributed System Security Symposium
, pp. 1-17
-
-
Newsome, J.1
Song, D.2
-
4
-
-
84879667258
-
Software tampering detection using aop and mobile code
-
presented at, Lancaster, UK
-
P. Falcarin, M. Baldi and D. Mazzochi, "Software Tampering Detection Using AOP and Mobile Code, " presented at International Conference on Aspect-Oriented Software Development (AOSD'04), Lancaster, UK, 2004.
-
(2004)
International Conference on Aspect-Oriented Software Development (AOSD'04)
-
-
Falcarin, P.1
Baldi, M.2
Mazzochi, D.3
-
5
-
-
84879626129
-
A case study on estimating the software engineering properties of implementing database encryption as an aspect
-
presented at, Lancaster, UK
-
G. Boström, "A Case Study on Estimating the Software Engineering Properties of Implementing Database Encryption as an Aspect, " presented at Proceedings of the 3rd international conference on Aspectoriented software development, Lancaster, UK, 2004.
-
(2004)
Proceedings of the 3rd International Conference on Aspectoriented Software Development
-
-
Boström, G.1
-
6
-
-
84856534202
-
Aosd security: A practical assessment
-
presented at, Boston, Massachusetts
-
B. De Win, W. Joosen and F. Piessens, "Aosd Security: A Practical Assessment, " presented at Workshop on Software engineering Properties of Languages for Aspect Technologies (SPLAT03), Boston, Massachusetts, 2003.
-
(2003)
Workshop on Software Engineering Properties of Languages for Aspect Technologies (SPLAT03)
-
-
Win, B.D.1
Joosen, W.2
Piessens, F.3
-
7
-
-
39049100193
-
Aop, security and genericity
-
presented at, Vrije Universiteit Brussel, Brussels, Belgium
-
B. Vanhaute and B. De Win, "AOP, Security and Genericity, " presented at 1st Belgian AOSD Workshop, Vrije Universiteit Brussel, Brussels, Belgium, 2001.
-
(2001)
1st Belgian AOSD Workshop
-
-
Vanhaute, B.1
De Win, B.2
-
9
-
-
33645413452
-
An aop implementation framework for extending joint point models
-
presented at, Oslo, Norway
-
N. Ubayashi, H. Masuhara and T. Tamai, "An AOP Implementation Framework for Extending Joint Point Models, " presented at ECOOP' 2004 Workshop on Reflection, AOP and Meta-Data for Software Evolution, Oslo, Norway, 2004.
-
(2004)
ECOOP' 2004 Workshop on Reflection, AOP and Meta-Data for Software Evolution
-
-
Ubayashi, N.1
Masuhara, H.2
Tamai, T.3
-
10
-
-
0037002475
-
Intrusion detection: A brief history and overview
-
April
-
R.A.V. Kemmerer, "Intrusion Detection: A Brief History and Overview, " Computer, vol. 35, pp.27-30, April 2002.
-
(2002)
Computer
, vol.35
, pp. 27-30
-
-
Kemmerer, R.A.V.1
-
11
-
-
33747192315
-
Anomaly detection in distributed computer communication systems
-
September
-
G. Adam, "Anomaly Detection in Distributed Computer Communication Systems, " Cybernetics and Systems, vol. 37, pp.635-652, September 2006.
-
(2006)
Cybernetics and Systems
, vol.37
, pp. 635-652
-
-
Adam, G.1
-
15
-
-
21644481499
-
A serial combination of anomaly and misuse idses applied to http traffic
-
December
-
E. Tombini, H. Debar, L. Me and M. Ducasse, "A Serial Combination of Anomaly and Misuse Idses Applied to Http Traffic, " in 20th Annual Computer Security Applications Conference, 2004., December 2004, pp.428-437.
-
(2004)
20th Annual Computer Security Applications Conference, 2004
, pp. 428-437
-
-
Tombini, E.1
Debar, H.2
Me, L.3
Ducasse, M.4
-
16
-
-
0031185890
-
Information flow control in object-oriented systems
-
July-August
-
P. Samarati, E. Bertino, A. Ciampichetti and S. Jajodia, "Information Flow Control in Object-Oriented Systems, " IEEE Transactions on Knowledge and Data Engineering, vol. 9, pp.624-538, July-August 1997.
-
(1997)
IEEE Transactions on Knowledge and Data Engineering
, vol.9
, pp. 538-624
-
-
Samarati, P.1
Bertino, E.2
Ciampichetti, A.3
Jajodia, S.4
-
19
-
-
0025065897
-
Integrating an object-oriented data model with multilevel security
-
May
-
S. Jajodia and B. Kogan, "Integrating an Object-Oriented Data Model with Multilevel Security, " in 1990 IEEE Symposium on Security and Privacy, May 1990, pp.76-85.
-
(1990)
1990 IEEE Symposium on Security and Privacy
, pp. 76-85
-
-
Jajodia, S.1
Kogan, B.2
-
21
-
-
0346609657
-
Applying aspect-oriented programming to security
-
February
-
J. Viega, J.T. Bloch and P. Chandra, "Applying Aspect-Oriented Programming to Security, " Cutter IT Journal, vol. 14, pp.31-39, February 2001.
-
(2001)
Cutter IT Journal
, vol.14
, pp. 31-39
-
-
Viega, J.1
Bloch, J.T.2
Chandra, P.3
-
23
-
-
85085405276
-
Using dynamic information flow analysis to detect attacks against applications
-
presented at, ACM Press New York, NY, USA, St. Louis, Missouri
-
W. Masri and A. Podgurski, "Using Dynamic Information Flow Analysis to Detect Attacks against Applications, " presented at Proceedings of the 2005 workshop on Software engineering for secure systems-building trustworthy applications, ACM Press New York, NY, USA, St. Louis, Missouri, 2005.
-
(2005)
Proceedings of the 2005 Workshop on Software Engineering for Secure Systems-building Trustworthy Applications
-
-
Masri, W.1
Podgurski, A.2
-
24
-
-
84879666113
-
Security for distributed web applications via aspect oriented security
-
presented at, Sandton, South Africa
-
N. Kuntze, T. Rauch and A.U. Schmidt, "Security for Distributed Web Applications Via Aspect Oriented Security, " presented at Conference Information Security South Africa, Sandton, South Africa, 2005.
-
(2005)
Conference Information Security South Africa
-
-
Kuntze, N.1
Rauch, T.2
Schmidt, A.U.3
-
25
-
-
1242287619
-
Dynamic adaptation of application aspects
-
May
-
F. Ortin and J.M. Cueva, "Dynamic Adaptation of Application Aspects, " Journal of Systems and Software, vol. 71, pp.229-243, May 2004.
-
(2004)
Journal of Systems and Software
, vol.71
, pp. 229-243
-
-
Ortin, F.1
Cueva, J.M.2
-
26
-
-
85008054329
-
Can aspect-oriented programming lead to more reliable software
-
November
-
J. Viega and J. Voas, "Can Aspect-Oriented Programming Lead to More Reliable Software, " IEEE Software, vol. 17, pp.19-21, November 2000.
-
(2000)
IEEE Software
, vol.17
, pp. 19-21
-
-
Viega, J.1
Voas, J.2
-
28
-
-
33646094363
-
Developing secure applications through aspect-oriented programming
-
Aksit, M. Clarke, S. Elrad, T. and Filman, R.E. Eds. Boston: Addison-Wesley
-
B. De Win, W. Joosen and F. Piessens. "Developing Secure Applications through Aspect-Oriented Programming." in Aspect-Oriented Software Development, Aksit, M., Clarke, S., Elrad, T. and Filman, R.E. Eds., Boston: Addison-Wesley, 2002, pp.633-650.
-
(2002)
Aspect-Oriented Software Development
, pp. 633-650
-
-
Win, B.D.1
Joosen, W.2
Piessens, F.3
-
29
-
-
0013090042
-
Getting started with aspectj
-
October
-
G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten and J. Palm, "Getting Started with Aspectj, " Communications of the ACM, vol. 44, pp.59-65, October 2001.
-
(2001)
Communications of the ACM
, vol.44
, pp. 59-65
-
-
Kiczales, G.1
Hilsdale, E.2
Hugunin, J.3
Kersten, M.4
Palm, J.5
-
30
-
-
84879648006
-
An aspect of application security management
-
presented at, Lancaster, UK
-
P. Robinson, M. Rits and R. Kilian-Kehr, "An Aspect of Application Security Management, " presented at AOSD'04 International Conference on Aspect-Oriented Software Development, Lancaster, UK, 2004.
-
(2004)
AOSD'04 International Conference on Aspect-Oriented Software Development
-
-
Robinson, P.1
Rits, M.2
Kilian-Kehr, R.3
-
33
-
-
84872808433
-
Comparison study of aspect-oriented and container managed security
-
presented at, AGH University of Science and Technology, Darmstadt, Germany
-
P. Slowikowski and K. Zielinski, "Comparison Study of Aspect-Oriented and Container Managed Security, " presented at AAOS 2003:Analysis of Aspect-Oriented Software (Workshop held in conjunction with ECOOP 2003), AGH University of Science and Technology, Darmstadt, Germany, 2003.
-
(2003)
AAOS 2003:Analysis of Aspect-Oriented Software (Workshop Held in Conjunction with ECOOP 2003)
-
-
Slowikowski, P.1
Zielinski, K.2
|