메뉴 건너뛰기




Volumn , Issue , 2019, Pages 105-118

Static checking of dynamically-varying security policies in database-backed applications

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; DATABASE SYSTEMS; SECURITY SYSTEMS; SYSTEMS ANALYSIS;

EID: 85076922866     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (40)

References (23)
  • 1
    • 0030643343 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • ABADI, M., AND GORDON, A. D. A calculus for cryptographic protocols: The spi calculus. In Proc. CCS (1997).
    • (1997) Proc. CCS
    • Abadi, M.1    Gordon, A.D.2
  • 3
    • 77954755242 scopus 로고    scopus 로고
    • UR: Statically-typed metaprogramming with type-level record computation
    • CHLIPALA, A. Ur: Statically-typed metaprogramming with type-level record computation. In Proc. PLDI (2010).
    • (2010) Proc. PLDI
    • Chlipala, A.1
  • 5
    • 84877700103 scopus 로고    scopus 로고
    • SIF: Enforcing confidentiality and integrity in web applications
    • CHONG, S., VIKRAM, K., AND MYERS, A. C. SIF: Enforcing confidentiality and integrity in web applications. In Proc. USENIX Security (2007).
    • (2007) Proc. USENIX Security
    • Chong, S.1    Vikram, K.2    Myers, A.C.3
  • 7
    • 70849107905 scopus 로고    scopus 로고
    • Cross-tier, label-based security enforcement for web applications
    • CORCORAN, B. J., SWAMY, N., AND HICKS, M. Cross-tier, label-based security enforcement for web applications. In Proc. SIGMOD (2009).
    • (2009) Proc. SIGMOD
    • Corcoran, B.J.1    Swamy, N.2    Hicks, M.3
  • 8
    • 24944448541 scopus 로고    scopus 로고
    • Simplify: A theorem prover for program checking
    • DETLEFS, D., NELSON, G., AND SAXE, J. B. Simplify: a theorem prover for program checking. J. ACM 52, 3 (2005), 365-473.
    • (2005) J. ACM , vol.52 , Issue.3 , pp. 365-473
    • Detlefs, D.1    Nelson, G.2    Saxe, J.B.3
  • 11
    • 77952407110 scopus 로고    scopus 로고
    • Amnesia: Analysis and monitoring for neutralizing SQL-injection attacks
    • HALFOND, W. G. J., AND ORSO, A. AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks. In Proc. ASE (2005).
    • (2005) Proc. ASE
    • Halfond, W.G.J.1    Orso, A.2
  • 14
    • 28144453801 scopus 로고    scopus 로고
    • Practical information-flow control in web-based information systems
    • LI, P., AND ZDANCEWIC, S. Practical information-flow control in web-based information systems. In Proc. CSFW (2005).
    • (2005) Proc. CSFW
    • Li, P.1    Zdancewic, S.2
  • 15
    • 0001851744 scopus 로고    scopus 로고
    • JFlow: Practical mostly-static information flow control
    • MYERS, A. C. JFlow: Practical mostly-static information flow control. In Proc. POPL (1999).
    • (1999) Proc. POPL
    • Myers, A.C.1
  • 18
    • 3142702944 scopus 로고    scopus 로고
    • Extending query rewriting techniques for fine-grained access control
    • RIZVI, S., MENDELZON, A., SUDARSHAN, S., AND ROY, P. Extending query rewriting techniques for fine-grained access control. In Proc. SIGMOD (2004).
    • (2004) Proc. SIGMOD
    • Rizvi, S.1    Mendelzon, A.2    Sudarshan, S.3    Roy, P.4
  • 19
  • 21
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • XIE, Y., AND AIKEN, A. Static detection of security vulnerabilities in scripting languages. In Proc. USENIX Security (2006).
    • (2006) Proc. USENIX Security
    • Xie, Y.1    Aiken, A.2
  • 22
    • 72249104474 scopus 로고    scopus 로고
    • Improving application security with data flow assertions
    • YIP, A., WANG, X., ZELDOVICH, N., AND KAASHOEK, M. F. Improving application security with data flow assertions. In Proc. SOSP (2009).
    • (2009) Proc. SOSP
    • Yip, A.1    Wang, X.2    Zeldovich, N.3    Kaashoek, M.F.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.