-
1
-
-
14844332191
-
More enforceable security policies
-
Copenhagen, Denmark, 25-26 July. DIKU Technical Report
-
L. Bauer, J. Ligatti, and D. Walker. More enforceable security policies. In Foundations of Computer Security, pages 95-104, Copenhagen, Denmark, 25-26 July 2002. DIKU Technical Report.
-
(2002)
Foundations of Computer Security
, pp. 95-104
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
2
-
-
33646064059
-
-
Tech. Rep TR-681-03, Princeton University, May
-
L. Bauer, J. Ligatti, and D. Walker. Edit automata: Enforcement mechanisms for run-time security policies. Tech. Rep TR-681-03, Princeton University, May, 2003.
-
(2003)
Edit Automata: Enforcement Mechanisms For Run-Time Security Policies
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
3
-
-
33745267229
-
Composing security policies with polymer
-
L. Bauer, J. Ligatti, and D. Walker. Composing security policies with polymer. SIGPLAN Not., 40(6):305-314, 2005.
-
(2005)
SIGPLAN Not.
, vol.40
, Issue.6
, pp. 305-314
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
5
-
-
0030108489
-
Local languages and the berry-sethi algorithm
-
J. Berstel and J. E. Pin. Local languages and the berry-sethi algorithm. Theoretical Comput. Sci., 155:439-446, 1996.
-
(1996)
Theoretical Comput. Sci.
, vol.155
, pp. 439-446
-
-
Berstel, J.1
Pin, J.E.2
-
9
-
-
0347269342
-
Families of locally testable languages
-
P. Caron. Families of locally testable languages. Theor. Comput. Sci., 242(1-2):361-376, 2000.
-
(2000)
Theor. Comput. Sci.
, vol.242
, Issue.1-2
, pp. 361-376
-
-
Caron, P.1
-
11
-
-
0033489650
-
Sasi enforcement of security policies: a retrospective
-
Caledon Hills, Ontario, Canada, ACM Press
-
U. Erlingsson and F. B. Schneider. Sasi enforcement of security policies: a retrospective. In Proceedings of the New Security Paradigms Workshop, pages 87-95. Caledon Hills, Ontario, Canada, ACM Press, 2000.
-
(2000)
Proceedings of the New Security Paradigms Workshop
, pp. 87-95
-
-
Erlingsson, U.1
Schneider, F.B.2
-
14
-
-
0021426851
-
A note on denial-of-service in operating systems
-
V. D. Gligor. A note on denial-of-service in operating systems. IEEE Trans. Softw. Eng., 10(3):320-324, 1984.
-
(1984)
IEEE Trans. Softw. Eng.
, vol.10
, Issue.3
, pp. 320-324
-
-
Gligor, V.D.1
-
15
-
-
0032218233
-
History-based access control for mobile code
-
San Francisco, CA, USA, November
-
A. A. G. Edjladi and V. Chaudhary. History-based access control for mobile code. In 5th ACM Conference on Computer and Communications Security, pages 38-48, San Francisco, CA, USA, November 1998.
-
(1998)
5th ACM Conference on Computer and Communications Security
, pp. 38-48
-
-
Edjladi, A.A.G.1
Chaudhary, V.2
-
16
-
-
33745329295
-
Computability classes for enforcement mechanisms
-
K. W. Hamlen, G. Morrisett, and F. B. Schneider. Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst., 28(1):175-205, 2006.
-
(2006)
ACM Trans. Program. Lang. Syst.
, vol.28
, Issue.1
, pp. 175-205
-
-
Hamlen, K.W.1
Morrisett, G.2
Schneider, F.B.3
-
18
-
-
14844313206
-
Computational analysis of run-time monitoring
-
In K. Havelund and G. Roşu, editors, Elsevier Science, July 26
-
M. Kim, S. Kannan, I. Lee, S. Sokolsky, and M. Viswanathan. Computational analysis of run-time monitoring. In K. Havelund and G. Roşu, editors, Runtime Verification, volume 70 of Electronic Notes in Theoretical Computer Science, pages 81-95. Elsevier Science, July 26 2002.
-
(2002)
Runtime Verification, volume 70 of Electronic Notes in Theoretical Computer Science
, pp. 81-95
-
-
Kim, M.1
Kannan, S.2
Lee, I.3
Sokolsky, S.4
Viswanathan, M.5
-
19
-
-
0017472779
-
Proving the correctness of multiprocess programs
-
L. Lamport. Proving the correctness of multiprocess programs. IEEE Transactions of Software Engineering, 3(2):125-143, 1977.
-
(1977)
IEEE Transactions of Software Engineering
, vol.3
, Issue.2
, pp. 125-143
-
-
Lamport, L.1
-
20
-
-
18944373357
-
Combining monitors for runtime system verification
-
In K. Havelund and G. Rosu, editors, Elsevier
-
J. Levy, H. Saidi, and T. E. Uribe. Combining monitors for runtime system verification. In K. Havelund and G. Rosu, editors, Electronic Notes in Theoretical Computer Science, volume 70. Elsevier, 2002.
-
(2002)
Electronic Notes in Theoretical Computer Science
, vol.70
-
-
Levy, J.1
Saidi, H.2
Uribe, T.E.3
-
21
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
Feb. 2005. Published online 26 Oct
-
J. Ligatti, L. Bauer, and D. Walker. Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security, 4(1-2):2-16, Feb. 2005. (Published online 26 Oct 2004.).
-
(2004)
International Journal of Information Security
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
25
-
-
2942723443
-
-
Elsevier
-
D. Perrin and J. E. Pin. Infinite Words. Automata, Semigroups, Logic and Games, volume 141 of Pure and Applied Mathematics. Elsevier, 1004.
-
Infinite Words. Automata, Semigroups, Logic and Games, volume 141 of Pure and Applied Mathematics
, pp. 1004
-
-
Perrin, D.1
Pin, J.E.2
-
28
-
-
0002230149
-
Finite semigroups and recognizable languages: an introduction
-
In J. Fountain, editor, Kluwer academic publishers
-
J. E. Pin. Finite semigroups and recognizable languages: an introduction. In J. Fountain, editor, NATO Advanced Study Institute Semigroups, Formal Languages and Groups, pages 1-32. Kluwer academic publishers, 1995.
-
(1995)
NATO Advanced Study Institute Semigroups, Formal Languages and Groups
, pp. 1-32
-
-
Pin, J.E.1
-
32
-
-
0026243650
-
A polynomial time algorithm for the local testability problem of deterministic finite automata
-
R. M. S. Kim, R. McNaughton. A polynomial time algorithm for the local testability problem of deterministic finite automata. IEEE Trans. Comput, 40:1087-1093, 1991.
-
(1991)
IEEE Trans. Comput
, vol.40
, pp. 1087-1093
-
-
Kim, R.M.S.1
McNaughton, R.2
-
33
-
-
0028743322
-
Computing the order of a locally testable automaton
-
R. M. S. Kim. Computing the order of a locally testable automaton. SIAM Journal of Computing, 23:1193-1215, 1994.
-
(1994)
SIAM Journal of Computing
, vol.23
, pp. 1193-1215
-
-
Kim, R.M.S.1
-
35
-
-
84908308177
-
An algorithm to verify local threshold testability of deterministic finite automata
-
A. N. Trahtman. An algorithm to verify local threshold testability of deterministic finite automata. Lecture Notes in Computer Science, 2214:164+, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2214
, pp. 164
-
-
Trahtman, A.N.1
|