-
1
-
-
72149109122
-
Region pointcut for AspectJ
-
ACM
-
S. Akai, S. Chiba, and M. Nishizawa. Region pointcut for AspectJ. In Proceedings, 8th workshop on Aspects, components, and patterns for infrastructure software, ACP4IS '09, pages 43-48. ACM, 2009.
-
(2009)
Proceedings, 8th Workshop on Aspects, Components, and Patterns for Infrastructure Software, ACP4IS '09
, pp. 43-48
-
-
Akai, S.1
Chiba, S.2
Nishizawa, M.3
-
3
-
-
84900000827
-
Information flow control for secure cloud computing
-
submitted to
-
J. Bacon, D. Eyers, T. F. Pasquier, J. Singh, I. Papagiannis, and P. Pietzuch. Information Flow Control for secure cloud computing. submitted to: IEEE Transactions on Network and Service Manage-ment, Special Issue on Management of Cloud Services, 2014.
-
(2014)
IEEE Transactions on Network and Service Manage-ment, Special Issue on Management of Cloud Services
-
-
Bacon, J.1
Eyers, D.2
Pasquier, T.F.3
Singh, J.4
Papagiannis, I.5
Pietzuch, P.6
-
4
-
-
33744525631
-
The bell-lapadula model
-
D. Bell. The Bell-LaPadula model. Journal of computer security, 4 (2):3, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2
, pp. 3
-
-
Bell, D.1
-
6
-
-
0003400255
-
Integrity considerations for secure computer systems
-
K. J. Biba. Integrity considerations for secure computer systems. Technical report, DTIC Document, 1977.
-
(1977)
Technical Report, DTIC Document
-
-
Biba, K.J.1
-
7
-
-
84869486902
-
Abstractions for usable information flow control in aeolus
-
W. Cheng, D. R. Ports, D. Schultz, V. Popic, A. Blankstein, J. Cowling, D. Curtis, L. Shrira, and B. Liskov. Abstractions for usable information flow control in Aeolus. In Proceedings, USENIX Annual Technical Conference (Usenix ATC '12), 2012.
-
(2012)
Proceedings, USENIX Annual Technical Conference (Usenix ATC '12)
-
-
Cheng, W.1
Ports, D.R.2
Schultz, D.3
Popic, V.4
Blankstein, A.5
Cowling, J.6
Curtis, D.7
Shrira, L.8
Liskov, B.9
-
9
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning. A lattice model of secure information flow. Commun. ACM, 19(5):236-243, May 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
10
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Commun. ACM, 20(7):504-513, July 1977.
-
(1977)
Commun. ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
11
-
-
14944384797
-
Security through aspect-oriented programming
-
Springer US
-
B. DeWin, B. DeVanhaute, and B. DeDecker. Security Through Aspect-Oriented Programming. In Advances in Network and Distributed Systems Security, Volume 78 of IFIP, pages 125-138. Springer US, 2002.
-
(2002)
Advances in Network and Distributed Systems Security, Volume 78 of IFIP
, pp. 125-138
-
-
DeWin, B.1
DeVanhaute, B.2
DeDecker, B.3
-
12
-
-
84860491013
-
A closer look at aspect interference and cooperation
-
New York, NY, USA ACM
-
C. Disenfeld and S. Katz. A closer look at aspect interference and cooperation. In Proceedings of the 11th annual international conference on Aspect-oriented Software Development, AOSD'12, pages 107-118, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 11th Annual International Conference on Aspect-oriented Software Development, AOSD'12
, pp. 107-118
-
-
Disenfeld, C.1
Katz, S.2
-
13
-
-
84885664275
-
Labels and event processes in the asbestos operating system
-
ACM
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris. Labels and event processes in the Asbestos operating system. In Proceedings, 20th ACM Symposium on Operating Systems Principles, SOSP '05, pages 17-30. ACM, 2005.
-
(2005)
Proceedings, 20th ACM Symposium on Operating Systems Principles, SOSP '05
, pp. 17-30
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazières, D.7
Kaashoek, F.8
Morris, R.9
-
14
-
-
57349092460
-
Evolving software product lines with aspects
-
ICSE '08. ACM/IEEE 30th International Conference on
-
E. Figueiredo, N. Cacho, C. Sant'Anna, M. Monteiro, U. Kulesza, A. Garcia, S. Soares, F. Ferrari, S. Khan, F. Filho, and F. Dantas. Evolving software product lines with Aspects. In Software Engineering, 2008. ICSE '08. ACM/IEEE 30th International Conference on, pages 261-270, 2008.
-
(2008)
Software Engineering, 2008
, pp. 261-270
-
-
Figueiredo, E.1
Cacho, N.2
Sant'Anna, C.3
Monteiro, M.4
Kulesza, U.5
Garcia, A.6
Soares, S.7
Ferrari, F.8
Khan, S.9
Filho, F.10
Dantas, F.11
-
15
-
-
84900035357
-
DTA++: Dynamic taint analysis with targeted control-flow propagation
-
San Diego, CA Internet Society
-
M. Gyung, S. McCamant, P. Poosankam, and D. Song. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation. In Network and Distributed System Security Symposium (NDSS), San Diego, CA, 2011. Internet Society.
-
(2011)
Network and Distributed System Security Symposium (NDSS)
-
-
Gyung, M.1
McCamant, S.2
Poosankam, P.3
Song, D.4
-
17
-
-
83755174097
-
SafeWeb: A middleware for securing ruby-based web applications
-
P. Hosek, M. Migliavacca, I. Papagiannis, D. Eyers, D. Evans, B. Shand, J. Bacon, and P. Pietzuch. SafeWeb: A middleware for securing Ruby-based web applications. In Middleware, pages 491-512, 2011.
-
(2011)
Middleware
, pp. 491-512
-
-
Hosek, P.1
Migliavacca, M.2
Papagiannis, I.3
Eyers, D.4
Evans, D.5
Shand, B.6
Bacon, J.7
Pietzuch, P.8
-
20
-
-
80051974927
-
Timing- and termination-sensitive secure information flow: Exploring a new aproach
-
Berkeley, CA IEEE
-
V. Kashyap, B. Wiedermann, and B. Hardekopf. Timing- and termination-sensitive secure information flow: exploring a new aproach. In Symposium on Security and Privacy, Berkeley, CA, 2011. IEEE.
-
(2011)
Symposium on Security and Privacy
-
-
Kashyap, V.1
Wiedermann, B.2
Hardekopf, B.3
-
21
-
-
42549128483
-
A case study implementing features using AspectJ
-
SPLC 2007. 11th International
-
C. Kastner, S. Apel, and D. Batory. A case study implementing features using AspectJ. In Software Product Line Conference, 2007. SPLC 2007. 11th International, pages 223-232, 2007.
-
(2007)
Software Product Line Conference, 2007
, pp. 223-232
-
-
Kastner, C.1
Apel, S.2
Batory, D.3
-
22
-
-
0003973763
-
-
Springer
-
G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. Lopes, J.-M. Loingtier, and J. Irwin. Aspect-Oriented Programming. Springer, 1997.
-
(1997)
Aspect-Oriented Programming
-
-
Kiczales, G.1
Lamping, J.2
Mendhekar, A.3
Maeda, C.4
Lopes, C.5
Loingtier, J.-M.6
Irwin, J.7
-
23
-
-
82955230066
-
An overview of AspectJ
-
J. L. Knudsen, editor Springer
-
G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W. G. Griswold. An overview of AspectJ. In J. L. Knudsen, editor, ECOOP 2001 âǍŤ Object-Oriented Programming, Volume 2072 of Lecture Notes in Computer Science, pages 327-354. Springer, 2001.
-
(2001)
ECOOP 2001 ÂǍŤ Object-Oriented Programming, Volume 2072 of Lecture Notes in Computer Science
, pp. 327-354
-
-
Kiczales, G.1
Hilsdale, E.2
Hugunin, J.3
Kersten, M.4
Palm, J.5
Griswold, W.G.6
-
24
-
-
57749192483
-
Information flow control for standard OS abstractions
-
Oct
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris. Information Flow Control for standard OS abstractions. SIGOPS Oper. Syst. Rev., 41(6):321-334, Oct 2007.
-
(2007)
SIGOPS Oper. Syst. Rev.
, vol.41
, Issue.6
, pp. 321-334
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
25
-
-
39049160206
-
A general dynamic information flow tracking framework for security applications
-
ACSAC '06. 22nd Annual 2006
-
L. C. Lam and Tcker Chiueh. A general dynamic information flow tracking framework for security applications. In Computer Security Applications Conference, 2006. ACSAC '06. 22nd Annual, pages 463-472, 2006.
-
(2006)
Computer Security Applications Conference
, pp. 463-472
-
-
Lam, L.C.1
Chiueh, T.2
-
26
-
-
0015672289
-
A note on the confinement problem
-
Oct.
-
B. W. Lampson. A note on the confinement problem. Commun. ACM, 16(10):613-615, Oct. 1973.
-
(1973)
Commun. ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
27
-
-
84945721946
-
A comment on the confinement problem
-
Nov.
-
S. B. Lipner. A comment on the confinement problem. SIGOPS Oper. Syst. Rev., 9(5):192-196, Nov. 1975.
-
(1975)
SIGOPS Oper. Syst. Rev.
, vol.9
, Issue.5
, pp. 192-196
-
-
Lipner, S.B.1
-
28
-
-
0033682245
-
A study on exception detection and handling using aspect-oriented programming
-
Proceedings of the 2000 International Conference on
-
M. Lippert and C. Lopes. A study on exception detection and handling using Aspect-Oriented Programming. In Software Engineering, 2000. Proceedings of the 2000 International Conference on, pages 418-427, 2000.
-
(2000)
Software Engineering, 2000
, pp. 418-427
-
-
Lippert, M.1
Lopes, C.2
-
29
-
-
84875986286
-
Aspectizing javascript security
-
New York, NY, USA ACM
-
F. Marchand de Kerchove, J. Noyé, and M. Südholt. Aspectizing javascript security. In Proceedings of the 3rd Workshop on Modularity in Systems Software, MISS'13, pages 7-12, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 3rd Workshop on Modularity in Systems Software, MISS'13
, pp. 7-12
-
-
Marchand De Kerchove, F.1
Noyé, J.2
Südholt, M.3
-
31
-
-
79951908511
-
DEFCon: High-performance event processing with information security
-
June
-
M. Migliavacca, I. Papagiannis, D. M. Eyers, B. Shand, J. Bacon, and P. Pietzuch. DEFCon: High-performance event processing with information security. USENIX Annual Technical Conference, June 2010.
-
(2010)
USENIX Annual Technical Conference
-
-
Migliavacca, M.1
Papagiannis, I.2
Eyers, D.M.3
Shand, B.4
Bacon, J.5
Pietzuch, P.6
-
32
-
-
49849090084
-
An aspect-oriented approach for the systematic security hardening of code
-
A. Mourad, M.-A. Laverdière, and M. Debbabi. An aspect-oriented approach for the systematic security hardening of code. Computers & Security, 27(3):101-114, 2008.
-
(2008)
Computers & Security
, vol.27
, Issue.3
, pp. 101-114
-
-
Mourad, A.1
Laverdière, M.-A.2
Debbabi, M.3
-
35
-
-
84937933114
-
Information flow control for a medical web portal
-
IADIS, March
-
T. Pasquier, B. Shand, and J. Bacon. Information Flow Control for a Medical Web Portal. In e-Society 2013. IADIS, March 2013.
-
(2013)
E-Society 2013
-
-
Pasquier, T.1
Shand, B.2
Bacon, J.3
-
38
-
-
0004238984
-
-
Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA
-
D. E. Robling Denning. Cryptography and data security. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1982.
-
(1982)
Cryptography and Data Security
-
-
Robling Denning, D.E.1
-
39
-
-
63149101516
-
A library for lightweight information-flow security in haskell
-
Sept.
-
A. Russo, K. Claessen, and J. Hughes. A library for lightweight information-flow security in Haskell. SIGPLAN Notices, 44(2):13-24, Sept. 2008.
-
(2008)
SIGPLAN Notices
, vol.44
, Issue.2
, pp. 13-24
-
-
Russo, A.1
Claessen, K.2
Hughes, J.3
-
42
-
-
0016555241
-
The protection of information in computer systems
-
J. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proc. IEEE, 63(9):1278-1308, 1975.
-
(1975)
Proc. IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.D.2
-
44
-
-
0013001321
-
AspectC++: An aspect-oriented extension to the C++ programming language
-
Australian Computer Society, Inc.
-
O. Spinczyk, A. Gal, and W. Schröder-Preikschat. AspectC++: an aspect-oriented extension to the C++ programming language. In Proceedings, 40th International Conference on Technology of Object-Oriented Languages and Systems (TOOLS Pacific 2002), Volume 10 of CRPIT '02, pages 53-60. Australian Computer Society, Inc., 2002.
-
(2002)
Proceedings, 40th International Conference on Technology of Object-Oriented Languages and Systems (TOOLS Pacific 2002), Volume 10 of CRPIT '02
, pp. 53-60
-
-
Spinczyk, O.1
Gal, A.2
Schröder-Preikschat, W.3
-
45
-
-
33750420156
-
The paradoxical success of aspect-oriented programming
-
Oct.
-
F. Steimann. The paradoxical success of aspect-oriented programming. SIGPLAN Not., 41(10):481-497, Oct. 2006.
-
(2006)
SIGPLAN Not.
, vol.41
, Issue.10
, pp. 481-497
-
-
Steimann, F.1
-
46
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
Oct.
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. SIGOPS Oper. Syst. Rev., 38(5):85-96, Oct. 2004.
-
(2004)
SIGOPS Oper. Syst. Rev.
, vol.38
, Issue.5
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
47
-
-
84876000614
-
Secure and modular access control with aspects
-
New York, NY, USA ACM
-
R. Toledo and E. Tanter. Secure and modular access control with Aspects. In Proceedings of the 12th annual international conference on Aspect-oriented software development, AOSD'13, pages 157-170, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 12th Annual International Conference on Aspect-oriented Software Development, AOSD'13
, pp. 157-170
-
-
Toledo, R.1
Tanter, E.2
-
49
-
-
21644475650
-
Rifle: An architectural framework for user-centric information-flow security
-
MICRO-37 2004. 37th International Symposium on
-
N. Vachharajani, M. Bridges, J. Chang, R. Rangan, G. Ottoni, J. Blome, G. Reis, M. Vachharajani, and D. August. Rifle: An architectural framework for user-centric information-flow security. In Microarchitecture, 2004. MICRO-37 2004. 37th International Symposium on, pages 243-254, 2004.
-
(2004)
Microarchitecture, 2004
, pp. 243-254
-
-
Vachharajani, N.1
Bridges, M.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.6
Reis, G.7
Vachharajani, M.8
August, D.9
-
50
-
-
85008054329
-
Can aspect-oriented programming lead to more reliable software?
-
J. Viega and J. Vuas. Can Aspect-Oriented Programming lead to more reliable software? Software, IEEE, 17(6):19-21, 2000.
-
(2000)
Software, IEEE
, vol.17
, Issue.6
, pp. 19-21
-
-
Viega, J.1
Vuas, J.2
-
51
-
-
0346609657
-
Applying aspect-oriented programming to security
-
J. Viega, J. Bloch, and P. Chandra. Applying Aspect-Oriented Programming to security. Cutter IT Journal, 14(2):31-39, 2001.
-
(2001)
Cutter IT Journal
, vol.14
, Issue.2
, pp. 31-39
-
-
Viega, J.1
Bloch, J.2
Chandra, P.3
-
52
-
-
84887309913
-
Cross site scripting prevention with dynamic data tainting and static analysis
-
San Diego, CA Internet Society
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross site scripting prevention with dynamic data tainting and static analysis. In Network and Distributed System Security Symposium (NDSS), San Diego, CA, 2007. Internet Society.
-
(2007)
Network and Distributed System Security Symposium (NDSS)
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
53
-
-
0030673701
-
Eliminating covert flows with minimum typings
-
Proceedings., 10th jun 1997
-
D. Volpano and G. Smith. Eliminating covert flows with minimum typings. In Computer Security Foundations Workshop, 1997. Proceedings., 10th, pages 156-168, jun 1997.
-
(1997)
Computer Security Foundations Workshop
, pp. 156-168
-
-
Volpano, D.1
Smith, G.2
-
55
-
-
77952279944
-
AOJS: An aspect-oriented javascript programming framework for web development
-
ACM
-
H. Washizaki, A. Kubo, T. Mizumachi, K. Eguchi, Y. Fukazawa, N. Yoshioka, H. Kanuka, T. Kodaka, N. Sugimoto, Y. Nagai, and R. Yamamoto. AOJS: An Aspect-Oriented Javascript programming framework for web development. In Proceedings, 8th workshop on Aspects, Components, and Patterns for Infrastructure Software, ACP4IS, pages 31-36. ACM, 2009.
-
(2009)
Proceedings, 8th Workshop on Aspects, Components, and Patterns for Infrastructure Software, ACP4IS
, pp. 31-36
-
-
Washizaki, H.1
Kubo, A.2
Mizumachi, T.3
Eguchi, K.4
Fukazawa, Y.5
Yoshioka, N.6
Kanuka, H.7
Kodaka, T.8
Sugimoto, N.9
Nagai, Y.10
Yamamoto, R.11
-
56
-
-
72249104474
-
Improving application security with data flow assertions
-
New York, NY, USA ACM
-
A. Yip, X. Wang, N. Zeldovich, and M. F. Kaashoek. Improving application security with data flow assertions. In Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP'09, pages 291-304, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, SOSP'09
, pp. 291-304
-
-
Yip, A.1
Wang, X.2
Zeldovich, N.3
Kaashoek, M.F.4
-
57
-
-
84900005878
-
Aspect coordination for web applications in java/AspectJ and ruby/Aquarium
-
Nov.
-
A. Zambrano, A. Alvarez, J. Fabry, and S. Gordillo. Aspect Coordination for Web Applications in Java/AspectJ and Ruby/Aquarium. Proceedings, 28th International Conference of Chilean Computer Society, Nov. 2009.
-
(2009)
Proceedings, 28th International Conference of Chilean Computer Society
-
-
Zambrano, A.1
Alvarez, A.2
Fabry, J.3
Gordillo, S.4
|