-
2
-
-
84915768437
-
-
Mar. 2014
-
ANTLR (ANother Tool for Language Recognition). http://www.antlr.org/, Mar. 2014.
-
-
-
-
3
-
-
77954754889
-
Secpal: Design and semantics of a decentralized authorization language
-
M. Y. Becker, C. Fournet, and A. D. Gordon. Secpal: Design and semantics of a decentralized authorization language. Journal of Computer Security, 18(4), 2010.
-
(2010)
Journal of Computer Security
, vol.18
, Issue.4
-
-
Becker, M.Y.1
Fournet, C.2
Gordon, A.D.3
-
5
-
-
84982899264
-
The role of trust management in distributed systems security
-
Springer
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The role of trust management in distributed systems security. In Secure Internet Programming, Volume 1603, pages 185-210. Springer, 1999.
-
(1999)
Secure Internet Programming
, vol.1603
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
7
-
-
0035791053
-
Securing context-aware applications using environment roles
-
ACM
-
M. J. Covington, W. Long, S. Srinivasan, A. K. Dev, M. Ahamad, and G. D. Abowd. Securing context-aware applications using environment roles. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT), pages 10-20. ACM, 2001.
-
(2001)
Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dev, A.K.4
Ahamad, M.5
Abowd, G.D.6
-
8
-
-
0003593599
-
SPKI certificate theory
-
Sept.
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory. Technical report, IETF RFC 2693, Sept. 1999.
-
(1999)
Technical Report, IETF RFC 2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
9
-
-
78651539599
-
XFI: Software guards for system address spaces
-
USENIX, Nov.
-
U. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. C. Necula. XFI: software guards for system address spaces. In Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI), pages 75-88. USENIX, Nov. 2006.
-
(2006)
Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 75-88
-
-
Erlingsson, U.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G.C.5
-
13
-
-
84915768436
-
-
Dec.
-
Motoactv. https://motoactv.com, Dec. 2013.
-
(2013)
-
-
-
14
-
-
84889065012
-
Monitor integrity protection with space efficiency and separate compilation
-
New York, NY, USA ACM
-
B. Niu and G. Tan. Monitor integrity protection with space efficiency and separate compilation. In Proceedings of the 2013 ACM SIGSAC Conference on Computer - Communications Security, CCS'13, pages 199-210, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer - Communications Security, CCS'13
, pp. 199-210
-
-
Niu, B.1
Tan, G.2
-
15
-
-
0002313726
-
-
Citeseer
-
W. H. Press, S. A. Teukolsky, W. T. Vetterling, and B. P. Flannery. Numerical recipes in C, Volume 2. Citeseer, 1996.
-
(1996)
Numerical Recipes in C
, vol.2
-
-
Press, W.H.1
Teukolsky, S.A.2
Vetterling, W.T.3
Flannery, B.P.4
-
16
-
-
84860267053
-
An amulet for trustworthy wearable mHealth
-
Feb.
-
J. Sorber, M. Shin, R. Peterson, C. Cornelius, S. Mare, A. Prasad, Z. Marois, E. Smithayer, and D. Kotz. An Amulet for trustworthy wearable mHealth. In Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile), Feb. 2012.
-
(2012)
Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile)
-
-
Sorber, J.1
Shin, M.2
Peterson, R.3
Cornelius, C.4
Mare, S.5
Prasad, A.6
Marois, Z.7
Smithayer, E.8
Kotz, D.9
-
17
-
-
84890392640
-
Bringing java's wild native world under control
-
Dec.
-
M. Sun, G. Tan, J. Siefers, B. Zeng, and G. Morrisett. Bringing java's wild native world under control. ACM Trans. Inf. Syst. Secur., 16(3): 9:1-9:28, Dec. 2013.
-
(2013)
ACM Trans. Inf. Syst. Secur.
, vol.16
, Issue.3
, pp. 91-928
-
-
Sun, M.1
Tan, G.2
Siefers, J.3
Zeng, B.4
Morrisett, G.5
-
18
-
-
84915768433
-
-
Nov. 2013
-
FRAM Technology. http://www.ti.com/lsds/ti/microcontroller/16-bit-msp430/fram/overview.page, Nov. 2013.
-
FRAM Technology
-
-
-
20
-
-
80455129085
-
Armor: Fully verified software fault isolation
-
2011 Proceedings of the International Conference on IEEE, Oct.
-
L. Zhao, G. Li, B. De Sutter, and J. Regehr. Armor: Fully verified software fault isolation. In Embedded Software (EMSOFT), 2011 Proceedings of the International Conference on, pages 289-298. IEEE, Oct. 2011.
-
(2011)
Embedded Software (EMSOFT)
, pp. 289-298
-
-
Zhao, L.1
Li, G.2
De Sutter, B.3
Regehr, J.4
|