메뉴 건너뛰기




Volumn 1672, Issue , 1999, Pages 284-298

Language-based security: Invited lecture

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS);

EID: 84949229854     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48340-3_26     Document Type: Conference Paper
Times cited : (29)

References (34)
  • 1
  • 8
    • 0027353175 scopus 로고
    • A framework for defining logics
    • January
    • Robert Harper, Furio Honsell, and Gordon Plotkin. A framework for defining logics. J. Assoc. Comput. Mach., 40(1):143-184, January 1993.
    • (1993) J. Assoc. Comput. Mach , vol.40 , Issue.1 , pp. 143-184
    • Harper, R.1    Honsell, F.2    Plotkin, G.3
  • 11
    • 0004241913 scopus 로고    scopus 로고
    • Technical Report 98-1661, Computer Science Department, Cornell University, January
    • Dexter Kozen. Efficient code certification. Technical Report 98-1661, Computer Science Department, Cornell University, January 1998.
    • (1998) Efficient code certification
    • Kozen, D.1
  • 18
    • 0031543270 scopus 로고    scopus 로고
    • A decentralized model for information flow control
    • ACM, October
    • Andrew C. Myers and Barbara Liskov. A decentralized model for information flow control. In Proc. 16th Symp. Operating System Principles, pages 129-142. ACM, October 1997.
    • (1997) Proc. 16th Symp. Operating System Principles , pp. 129-142
    • Myers, A.C.1    Liskov, B.2
  • 19
    • 0031682833 scopus 로고    scopus 로고
    • Complete, safe information flow with decentralized labels
    • IEEE, May
    • Andrew C. Myers and Barbara Liskov. Complete, safe information flow with decentralized labels. In Proc. Symp. Security and Privacy, pages 186-197. IEEE, May 1998.
    • (1998) Proc. Symp. Security and Privacy , pp. 186-197
    • Myers, A.C.1    Liskov, B.2
  • 22
    • 0004118855 scopus 로고    scopus 로고
    • PhD thesis, Carnegie Mellon University, September
    • George C. Necula. Compiling with proofs. PhD thesis, Carnegie Mellon University, September 1998.
    • (1998) Compiling with proofs
    • Necula, G.C.1
  • 25
    • 49249101269 scopus 로고    scopus 로고
    • Efficient representation and validation of proofs
    • IEEE, June
    • George C. Necula and Peter Lee. Efficient representation and validation of proofs. In Proc. 13th Symp. Logic in Computer Science, pages 93-104. IEEE, June 1998.
    • (1998) Proc. 13th Symp. Logic in Computer Science , pp. 93-104
    • Necula, G.C.1    Lee, P.2
  • 27
    • 0032691230 scopus 로고    scopus 로고
    • A simple, comprehensive type system for Java bytecode subroutines
    • ACM SIGPLAN/SIGACT, January
    • Robert O'Callahan. A simple, comprehensive type system for Java bytecode subroutines. In Proc. 26th Symp. Principles of Programming Languages, pages 70-78. ACM SIGPLAN/SIGACT, January 1999.
    • (1999) Proc. 26th Symp. Principles of Programming Languages , pp. 70-78
    • O'Callahan, R.1
  • 29
    • 0003970441 scopus 로고    scopus 로고
    • Technical Report TR98-1664, Computer Science Department, Cornell University, January
    • Fred B. Schneider. Enforceable security policies. Technical Report TR98-1664, Computer Science Department, Cornell University, January 1998.
    • (1998) Enforceable security policies
    • Schneider, F.B.1
  • 30
    • 0003714340 scopus 로고    scopus 로고
    • editor. Committee on Information Systems Trustworthiness, Computer Science and Telecommunications Board, National Research Council. National Academy Press
    • Fred B. Schneider, editor. Trust in Cyberspace. Committee on Information Systems Trustworthiness, Computer Science and Telecommunications Board, National Research Council. National Academy Press, 1999.
    • (1999) Trust in Cyberspace
    • Schneider, F.B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.