-
1
-
-
84894128038
-
A minimal trusted computing base for dynamically ensuring secure information flow
-
November
-
Brown, J. and Knight, T. A Minimal Trusted Computing Base for Dynamically Ensuring Secure Information Flow. Project Aries TM-015 (November 2001).
-
(2001)
Project Aries TM-015
-
-
Brown, J.1
Knight, T.2
-
2
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
Denning D. E. A Lattice Model of Secure Information Flow. Comm. ACM, Vol. 19, No. 5 (May 1976), 236-242.
-
(1976)
Comm. ACM
, vol.19
, Issue.5
, pp. 236-242
-
-
Denning, D.E.1
-
3
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning D.E. and Denning P.J. Certification of programs for secure information flow. Communication of the ACM 20, 7 (1977), 504-513.
-
(1977)
Communication of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
4
-
-
0041684496
-
-
Ph.D. Thesis, Computer Science Dept., Purdue U., W. Lafayette, Ind., May
-
Denning, D.E. Secure information flow in computer systems. Ph.D. Thesis, Computer Science Dept., Purdue U., W. Lafayette, Ind., May 1975.
-
(1975)
Secure Information Flow in Computer Systems
-
-
Denning, D.E.1
-
6
-
-
0034997451
-
Finding failures by cluster analysis of execution profiles
-
Toronto, May
-
Dickinson, W., Leon, D., and Podgurski, A. Finding failures by cluster analysis of execution profiles. 23rd Intl. Conf. on Software Engineering (Toronto, May 2001), 339-348.
-
(2001)
23rd Intl. Conf. on Software Engineering
, pp. 339-348
-
-
Dickinson, W.1
Leon, D.2
Podgurski, A.3
-
7
-
-
0035783436
-
Pursuing failure: The distribution of program failures in a profile space
-
Vienna, September, ACM Press
-
Dickinson, W., Leon, D., and Podgurski, A. Pursuing failure: the distribution of program failures in a profile space. 10th European Software Engineering Conf. and 9th ACM SIGSOFT Symp. on the Foundations of Software Engineering (Vienna, September 2001), ACM Press, 246-255.
-
(2001)
10th European Software Engineering Conf. and 9th ACM SIGSOFT Symp. on the Foundations of Software Engineering
, pp. 246-255
-
-
Dickinson, W.1
Leon, D.2
Podgurski, A.3
-
8
-
-
70349100099
-
Anomaly detection using call stack information
-
Berkeley, CA, May
-
H. H. Feng, O. M. Kolesnikov, P. Fogla, W. Lee, and W. Gong. Anomaly detection using call stack information. 2003 IEEE Symposium on Security and Privacy (Berkeley, CA, May 2003).
-
(2003)
2003 IEEE Symposium on Security and Privacy
-
-
Feng, H.H.1
Kolesnikov, O.M.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
9
-
-
0016382977
-
Memoryless subsystems
-
Fenton, J.S. Memoryless Subsystems. The Computer Journal 17, 2 (1974), 143-147.
-
(1974)
The Computer Journal
, vol.17
, Issue.2
, pp. 143-147
-
-
Fenton, J.S.1
-
10
-
-
0023385308
-
The program dependence graph and its use in optimization
-
October
-
Ferrante J., Ottenstein K.J., and Warren J.D.. The Program Dependence Graph and its Use in Optimization. ACM Transactions on Programming Languages and Systems 9, 3 (October 1987), 319-349.
-
(1987)
ACM Transactions on Programming Languages and Systems
, vol.9
, Issue.3
, pp. 319-349
-
-
Ferrante, J.1
Ottenstein, K.J.2
Warren, J.D.3
-
11
-
-
0029716418
-
A sense of self for unix processes
-
Los Alamitos, CA
-
Forrest S., Hofmeyr S.S., Somayaji A., Longstaff T.A. A sense of self for UNIX processes. 1996 IEEE Symposium on Security and Privacy (Los Alamitos, CA, 1996), 120-128
-
(1996)
1996 IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.S.2
Somayaji, A.3
Longstaff, T.A.4
-
13
-
-
85027586491
-
-
IBM
-
JConsole, http://javaconsole.sourceforge.net. IBM 2001.
-
(2001)
JConsole
-
-
-
15
-
-
0015672289
-
A note on the confinement problem
-
Oct
-
Lampson, B.W. A Note on the Confinement Problem. Communication of the ACM 16, 10 (Oct. 1973), 613-615.
-
(1973)
Communication of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
16
-
-
33244494413
-
An empirical evaluation of test case filtering techniques based on exercising complex information flows
-
To appear, St. Louis, MO, May
-
Leon, D., Masri W., Podgurski. A. An Empirical Evaluation of Test Case Filtering Techniques Based On Exercising Complex Information Flows. To appear in 2005 International Conference on Software Engineering (St. Louis, MO, May 2005).
-
(2005)
2005 International Conference on Software Engineering
-
-
Leon, D.1
Masri, W.2
Podgurski, A.3
-
17
-
-
0033719706
-
Multivariate visualization in observation-based testing
-
Limerick, Ireland, June, ACM Press
-
Leon, D., Podgurski, A., and White, L.J. Multivariate visualization in observation-based testing. 22nd Intl. Conf. on Software Engineering (Limerick, Ireland, June 2000), ACM Press, 116-125.
-
(2000)
22nd Intl. Conf. on Software Engineering
, pp. 116-125
-
-
Leon, D.1
Podgurski, A.2
White, L.J.3
-
19
-
-
16244362392
-
Detecting and debugging insecure information flows
-
St. Malo, France Nov 2-5
-
Masri, W., Podgurski, A., and Leon, D. Detecting and Debugging Insecure Information Flows. 15th. IEEE International Symposium on Software Reliability Engineering, ISSRE 2004. St. Malo, France Nov 2-5, 2004.
-
(2004)
15th. IEEE International Symposium on Software Reliability Engineering, ISSRE 2004
-
-
Masri, W.1
Podgurski, A.2
Leon, D.3
-
21
-
-
85027559127
-
-
Open Source Vulnerability Database (OSVDB): www.osvdb.org.
-
-
-
-
23
-
-
0025491545
-
A formal model of program dependencies and its implications for software testing debugging and maintenance
-
September
-
Podgurski A. and Clarke L. A Formal Model of Program Dependencies and its Implications for Software Testing, Debugging, and Maintenance. IEEE TSE, 16(9):965-979, September 1990.
-
(1990)
IEEE TSE
, vol.16
, Issue.9
, pp. 965-979
-
-
Podgurski, A.1
Clarke, L.2
-
29
-
-
16244399066
-
-
Apache Software Foundation
-
The Byte Code Engineering Library (BCEL), The Apache Jakarta Project, http://jakarta.apache.org/bcel. Apache Software Foundation 2003.
-
(2003)
The Apache Jakarta Project
-
-
|