메뉴 건너뛰기




Volumn , Issue , 2003, Pages 158-163

Insecure programming: How culpable is a language's syntax?

Author keywords

Computer errors; Computer languages; Computer science; Computer security; Creep; Data security; Java; Programming profession; Runtime; Writing

Indexed keywords

CODES (SYMBOLS); COMPUTATIONAL LINGUISTICS; COMPUTER PROGRAMMING; COMPUTER PROGRAMMING LANGUAGES; COMPUTER SCIENCE; CREEP; CYBERNETICS; ERRORS; SECURITY OF DATA; SEMANTICS; SOFTWARE ENGINEERING; SYNTACTICS; TECHNICAL WRITING;

EID: 84946417213     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SMCSIA.2003.1232415     Document Type: Conference Paper
Times cited : (1)

References (23)
  • 1
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the Stack for Fun and Profit
    • November
    • A. One, "Smashing the Stack for Fun and Profit." Phrack 49, Vol. 7, Issue 49, November 1996.
    • (1996) Phrack 49 , vol.7 , Issue.49
    • One, A.1
  • 6
  • 8
    • 84944220091 scopus 로고    scopus 로고
    • Towards development of secure systems using UML
    • Fundamental Approaches to Software Engineering (FASEiETAPS, International Conference) (H. HutJmann, ed.), Springer
    • J. Jfurjens, "Towards development of secure systems using UML," in Fundamental Approaches to Software Engineering (FASEiETAPS, International Conference) (H. HutJmann, ed.), LNCS, Springer, 2001.
    • (2001) LNCS
    • Jfurjens, J.1
  • 12
    • 0011221302 scopus 로고
    • On the expressive power of programming languages
    • (N. Jones, ed.), New York, N.Y.: Springer-Verlag
    • M. Felleisen, "On the expressive power of programming languages," in ESOP '90 3rd European Symposium on Programming, Copenhagen, Denmark (N. Jones, ed.), vol. 432, pp. 134-151, New York, N.Y.: Springer-Verlag, 1990.
    • (1990) ESOP '90 3rd European Symposium on Programming, Copenhagen, Denmark , vol.432 , pp. 134-151
    • Felleisen, M.1
  • 13
    • 0034298274 scopus 로고    scopus 로고
    • An empirical comparison of seven programming languages
    • L. Prechelt, "An empirical comparison of seven programming languages," Computer, vol. 33, no. 10, pp. 23-29, 2000.
    • (2000) Computer , vol.33 , Issue.10 , pp. 23-29
    • Prechelt, L.1
  • 15
    • 84956989228 scopus 로고    scopus 로고
    • A type-based approach to program security
    • D. M. Volpano and G. Smith, "A type-based approach to program security," in TAPSOFT, pp. 607-621, 1997.
    • (1997) TAPSOFT , pp. 607-621
    • Volpano, D.M.1    Smith, G.2
  • 17
    • 0015960104 scopus 로고
    • The string-to-string correction problem
    • R. Wagner and M. Fischer, "The string-to-string correction problem," Journal of the ACM (JACM), vol. 21, no. 1, pp. 168-173, 1974.
    • (1974) Journal of the ACM (JACM) , vol.21 , Issue.1 , pp. 168-173
    • Wagner, R.1    Fischer, M.2
  • 20
    • 84976767774 scopus 로고
    • Syntax-directed least-errors analysis for context-free languages: A practical approach
    • G. Lyon, "Syntax-directed least-errors analysis for context-free languages: a practical approach," Communications of the ACM, vol. 17, no. 1, pp. 3-14, 1974.
    • (1974) Communications of the ACM , vol.17 , Issue.1 , pp. 3-14
    • Lyon, G.1
  • 21
    • 0016578292 scopus 로고
    • Practical syntactic error recovery
    • November
    • S. Graham and S. Rhodes, "Practical syntactic error recovery," Communications of the ACM, vol. 18, pp. 639-650, November 1975.
    • (1975) Communications of the ACM , vol.18 , pp. 639-650
    • Graham, S.1    Rhodes, S.2
  • 23
    • 0034835461 scopus 로고    scopus 로고
    • A new type system for secure information flow
    • IEEE Computer Society Press, Jun
    • G. Smith, "A new type system for secure information flow," in CSFW14, IEEE Computer Society Press, Jun 2001.
    • (2001) CSFW14
    • Smith, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.