-
2
-
-
80054992065
-
Extensibility, safety, and performance in the SPIN operating system
-
ACM
-
Bershad, B., Savage, S., Pardyak, P., Sirer, E. G., Becker, D., Fiuczynski, M., Chambers, C., and Eggers, S. (1995). Extensibility, safety, and performance in the SPIN operating system. In Proceedings of the 15th Symposium on Operating System Principles, pages 267-284. ACM.
-
(1995)
Proceedings of the 15th Symposium On Operating System Principles
, pp. 267-284
-
-
Bershad, B.1
Savage, S.2
Pardyak, P.3
Sirer, E.G.4
Becker, D.5
Fiuczynski, M.6
Chambers, C.7
Eggers, S.8
-
3
-
-
0344146600
-
Making Components Contract Aware
-
Beugnard, A., Jezequel, J.-M., Plouzeau, N., and Watkins, D. (1999). Making Components Contract Aware. IEEE Computer, 32(7):38-45.
-
(1999)
IEEE Computer
, vol.32
, Issue.7
, pp. 38-45
-
-
Beugnard, A.1
Jezequel, J.-M.2
Plouzeau, N.3
Watkins, D.4
-
4
-
-
0028016985
-
About the enforcement of state dependent security specifications
-
Keefe, T. and Landwehr, C., editors, Elsevier Science (NorthHolland)
-
Biskup, J. and Eckert, C. (1994). About the enforcement of state dependent security specifications. In Keefe, T. and Landwehr, C., editors, Database Security, pages 3-17. Elsevier Science (NorthHolland).
-
(1994)
Database Security
, pp. 3-17
-
-
Biskup, J.1
Eckert, C.2
-
5
-
-
84904267908
-
-
cXML. cXML User's Guide. cXML.org, 1.2.006 edition
-
cXML (2001). cXML User's Guide. cXML.org, 1.2.006 edition.
-
(2001)
-
-
-
6
-
-
84904245743
-
-
DISA Xl2 Standard. Data Interchange Standards Association, release 4050 edition
-
DISA (2001). Xl2 Standard. Data Interchange Standards Association, release 4050 edition.
-
(2001)
-
-
-
7
-
-
0030708182
-
Providing flexibility in information flow control for object-oriented systems
-
Oakland
-
Ferrari, E., Samarati, P., Bertino, E., and Jajodia, S. (1997). Providing flexibility in information flow control for object-oriented systems. In Proceedings of the IEEE Symposium on Security and Privacy, pages 130-140, Oakland.
-
(1997)
Proceedings of the IEEE Symposium On Security and Privacy
, pp. 130-140
-
-
Ferrari, E.1
Samarati, P.2
Bertino, E.3
Jajodia, S.4
-
9
-
-
85084162735
-
A Secure Environment for Untrusted Helper Applications
-
Goldberg, I., Wagner, D., Thomas, R., and Brewer, E. (1996). A Secure Environment for Untrusted Helper Applications. In Proceedings of the 6th USENIX Security Symposium.
-
(1996)
Proceedings of the 6th USENIX Security Symposium
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.4
-
11
-
-
0033691822
-
A Framework for Modeling Transfer Protocols
-
Herrmann, P. and Krumm, H. (2000). A Framework for Modeling Transfer Protocols. Computer Networks, 34(2):317-337.
-
(2000)
Computer Networks
, vol.34
, Issue.2
, pp. 317-337
-
-
Herrmann, P.1
Krumm, H.2
-
13
-
-
0034872904
-
Trust-adapted enforcement of security policies in distributed component-structured applications
-
Hammamet. IEEE Computer Society Press
-
Herrmann, P. and Krumm, H. (2001). Trust-adapted enforcement of security policies in distributed component-structured applications. In Proceedings of the 6th IEEE Symposium on Computers and Communications, pages 2-8, Hammamet. IEEE Computer Society Press.
-
(2001)
Proceedings of the 6th IEEE Symposium On Computers and Communications
, pp. 2-8
-
-
Herrmann, P.1
Krumm, H.2
-
15
-
-
0007863633
-
A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components
-
Canberra. IEEE Computer Society Press
-
Khan, K., Han, J., and Zheng, Y. (2001). A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components. In Proceedings of the Australian Software Engineering Conference (ASWEC'Ol), pages 117-126, Canberra. IEEE Computer Society Press.
-
(2001)
Proceedings of the Australian Software Engineering Conference (ASWEC'Ol)
, pp. 117-126
-
-
Khan, K.1
Han, J.2
Zheng, Y.3
-
16
-
-
0004241913
-
-
Technical Report 98-1661, Computer Science Department, Cornell University
-
Kozen, D. (1998). Efficient code certification. Technical Report 98-1661, Computer Science Department, Cornell University.
-
(1998)
Efficient Code Certification
-
-
Kozen, D.1
-
17
-
-
84949229854
-
Language-Based Security
-
In Kutylowski, M., Pacholski, L., and Wierzbicki, T., editors, Lecture Notes in Computer Science 1672, Springer-Verlag
-
Kozen, D. (1999). Language-Based Security. In Kutylowski, M., Pacholski, L., and Wierzbicki, T., editors, Proceedings of the Conference on Mathematical Foundations of Computer Science (MFCS'99), Lecture Notes in Computer Science 1672, pages 284-298. Springer-Verlag.
-
(1999)
Proceedings of the Conference On Mathematical Foundations of Computer Science (MFCS'99)
, pp. 284-298
-
-
Kozen, D.1
-
20
-
-
0031679751
-
From System F to typed assembly language
-
San Diego
-
Morrisett, G., Walker, D., Crary, K., and Glew, N. (1998). From System F to typed assembly language. In Proceedings of the 25th ACM SIGPLAN/SIGACT Symposium on Principles of Programming Languages, pages 85-97, San Diego.
-
(1998)
Proceedings of the 25th ACM SIGPLAN/SIGACT Symposium On Principles of Programming Languages
, pp. 85-97
-
-
Morrisett, G.1
Walker, D.2
Crary, K.3
Glew, N.4
-
22
-
-
0004118855
-
-
PhD thesis, Carnegie Mellon University
-
Necula, G. C. (1998). Compiling with proofs. PhD thesis, Carnegie Mellon University.
-
(1998)
Compiling With Proofs
-
-
Necula, G.C.1
-
23
-
-
84904257011
-
-
OBI OBI Technical Specifications- Open Buying on the Internet. OBI Consortium, draft release v2.1 edition
-
OBI (1999). OBI Technical Specifications- Open Buying on the Internet. OBI Consortium, draft release v2.1 edition.
-
(1999)
-
-
-
27
-
-
0029720098
-
TIL: A typedirected optimizing compiler for ML
-
ACM SIGPLAN
-
Tarditi, D., Morrisett, G., Cheng, P., Stone, C., Harper, R., and Lee, P. (1996). TIL: A typedirected optimizing compiler for ML. In Proceedings of the Conference on Programming Language Design and Implementation. ACM SIGPLAN.
-
(1996)
Proceedings of the Conference On Programming Language Design and Implementation
-
-
Tarditi, D.1
Morrisett, G.2
Cheng, P.3
Stone, C.4
Harper, R.5
Lee, P.6
-
28
-
-
0001829728
-
Architecture and specification style in formal descriptions of distributed systems
-
Agarwal, S. and Sabnani, K., editors, Elsevier. IFIP
-
Vissers, C. A., Scollo, G., and van Sinderen, M. (1988). Architecture and specification style in formal descriptions of distributed systems. In Agarwal, S. and Sabnani, K., editors, Protocol Specification, Testing and Verification, volume 8, pages 189-204, Elsevier. IFIP.
-
(1988)
Protocol Specification, Testing and Verification
, vol.8
, pp. 189-204
-
-
Vissers, C.A.1
Scollo, G.2
van Sinderen, M.3
-
29
-
-
0027836576
-
Efficient software-based fault isolation
-
ACM
-
Wabbe, R., Lucco, S., Anderson, T. E., and Graham, S. L. (1993). Efficient software-based fault isolation. In Proceedings of the 14th Symposium on Operating System Principles, pages 203-216. ACM.
-
(1993)
Proceedings of the 14th Symposium On Operating System Principles
, pp. 203-216
-
-
Wabbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
30
-
-
84957886335
-
Modeling the security of steganographic systems
-
LNCS 1525, Portland. Springer-Verlag
-
Zollner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., and Wolf, G. (1998). Modeling the security of steganographic systems. In Proceedings of the 2nd Workshop of Information Hiding, LNCS 1525, pages 345-355, Portland. Springer-Verlag.
-
(1998)
In Proceedings of the 2nd Workshop of Information Hiding
, pp. 345-355
-
-
Zollner, J.1
Federrath, H.2
Klimant, H.3
Pfitzmann, A.4
Piotraschke, R.5
Westfeld, A.6
Wicke, G.7
Wolf, G.8
|