咨询与建议

限定检索结果

文献类型

  • 31 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 34 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 31 篇 工学
    • 31 篇 计算机科学与技术...
    • 30 篇 软件工程
    • 2 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 2 篇 安全科学与工程
    • 1 篇 力学(可授工学、理...
  • 18 篇 理学
    • 14 篇 数学
    • 3 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 8 篇 管理学
    • 5 篇 图书情报与档案管...
    • 4 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 法学
    • 1 篇 法学

主题

  • 11 篇 computer program...
  • 3 篇 computer program...
  • 2 篇 runtime
  • 2 篇 security of data
  • 2 篇 context sensitiv...
  • 2 篇 java programming...
  • 2 篇 dynamic programm...
  • 1 篇 object oriented ...
  • 1 篇 associate constr...
  • 1 篇 programming prof...
  • 1 篇 data security
  • 1 篇 access control
  • 1 篇 lattices
  • 1 篇 cross-lingual co...
  • 1 篇 cross-lingual in...
  • 1 篇 automatic progra...
  • 1 篇 computer securit...
  • 1 篇 optimization
  • 1 篇 linear programmi...
  • 1 篇 computer languag...

机构

  • 2 篇 carnegie mellon ...
  • 2 篇 ibm research
  • 1 篇 harvard universi...
  • 1 篇 chinese univ hon...
  • 1 篇 school of electr...
  • 1 篇 school of electr...
  • 1 篇 department of co...
  • 1 篇 university of ca...
  • 1 篇 university of ma...
  • 1 篇 microsoft resear...
  • 1 篇 university of ve...
  • 1 篇 tu wien austria
  • 1 篇 computer systems...
  • 1 篇 computer science...
  • 1 篇 department of co...
  • 1 篇 computer science...
  • 1 篇 university of ca...
  • 1 篇 department of el...
  • 1 篇 university of ma...
  • 1 篇 university of pe...

作者

  • 3 篇 hicks michael
  • 2 篇 smith scott f.
  • 1 篇 liu yanhong a.
  • 1 篇 erlingsson úlfar
  • 1 篇 spoonhower danie...
  • 1 篇 mcdaniel patrick
  • 1 篇 polakow jeff
  • 1 篇 ahmed el-mahdy
  • 1 篇 bridges matthew ...
  • 1 篇 raman easwaran
  • 1 篇 cheng perry
  • 1 篇 stoyle gareth
  • 1 篇 bhansali sanjay
  • 1 篇 liu michael yang...
  • 1 篇 hristova katia
  • 1 篇 siek jeremy
  • 1 篇 unno hiroshi
  • 1 篇 rothamel tom
  • 1 篇 blelloch guy e.
  • 1 篇 casey kevin

语言

  • 34 篇 英文
检索条件"任意字段=PLAS 2006 - 2006 Programming Languages and Analysis for Security Workshop"
34 条 记 录,以下是1-10 订阅
排序:
Diversified Remote Code Execution Using Dynamic Obfuscation of Conditional Branches
Diversified Remote Code Execution Using Dynamic Obfuscation ...
收藏 引用
International Conference on Distributed Computing Systems workshop
作者: Muhammad Hataba Reem Elkhouly Ahmed El-Mahdy Computer Science and Engineering Department Egypt-Japan University of Science and Technology (E-JUST) Alexandria Egypt
Information leakage via timing side-channel attacksis one of the main threats that target code executing on remoteplatforms such as the cloud computing environment. Theseattacks can be further leveraged to reverse-eng... 详细信息
来源: 评论
plas 2006 - Proceedings of the 2006 programming languages and analysis for security workshop
PLAS 2006 - Proceedings of the 2006 Programming Languages an...
收藏 引用
plas 2006 - 2006 programming languages and analysis for security workshop
The proceedings contain 11 papers. The topics discussed include: Object capabilities for security;applying flow-sensitive CQUAL to verify MINIX authorization check placement;certified in-lined reference monitoring on ... 详细信息
来源: 评论
Conference on programming Language Design and Implementation - plas 2006: Proceedings of the 2006 programming languages and analysis for security workshop
Conference on Programming Language Design and Implementation...
收藏 引用
ACM SIGPLAN Conference on programming Language Design and Implementation, PLDI 2006 - plas 2006: 2006 programming languages and analysis for security workshop
The proceedings contain 36 papers. The topics discussed include: optimizing memory transactions;compiler and runtime support for efficient software transactional memory;better extensibility through modular syntax;fast... 详细信息
来源: 评论
programming languages and program analysis for security : A three-year retrospective
Programming languages and program analysis for security : A ...
收藏 引用
作者: Pistoia, Marco Erlingsson, Úlfar IBM T. J. Watson Research Center United States Reykjavík University Iceland
Software security has been traditionally enforced at the level of operating systems. However, operating systems have become increasingly large and complex, and it is very difficult-if not impossible-to enforce softwar... 详细信息
来源: 评论
Object-Oriented Technology: ECOOP 2006 workshop Reader ECOOP 2006 workshops
Object-Oriented Technology: ECOOP 2006 Workshop Reader ECOOP...
收藏 引用
ECOOP 2006 workshop Reader - 10th European Conference on Obiect-Oriented programming
The proceedings contain 15 papers. The topics discussed include: implementation, compilation, optimization of object-oriented languages, programs and systems;aspects, dependencies, and interactions;formal techniques f... 详细信息
来源: 评论
An associate constraint network approach to extract multi-lingual information for crime analysis
收藏 引用
DECISION SUPPORT SYSTEMS 2007年 第4期43卷 1348-1361页
作者: Yang, Christopher C. Li, Kar Wing Chinese Univ Hong Kong Dept Syst Engn & Engn Management Hong Kong Peoples R China City Univ Hong Kong Dept Informat Sci Hong Kong Peoples R China
International crime and terrorism have drawn increasing attention in recent years. Retrieving relevant information from criminal records and suspect communications is important in combating international crime and ter... 详细信息
来源: 评论
Types for Proofs and Programs: International workshop, TYPES 2006 Revised Selected Papers
收藏 引用
International workshop on Types for Proofs and Programs, TYPES 2006
The proceedings contain 17 papers. The topics discussed include: crafting a proof assistant;crafting a proof assistant;on constructive cut admissibility in deduction modulo;fast reflexive arithmetic tactics the linear... 详细信息
来源: 评论
plas 2006 - Proceedings of the 2006 programming Language and analysis for security workshop: Foreword
PLAS 2006 - Proceedings of the 2006 Programming Languages an...
收藏 引用
plas 2006 - Proceedings of the 2006 programming languages and analysis for security workshop 2006年 2006卷 iii页
作者: Sreedhar, Vugranam Zdancewic, Steve IBM Research Japan University of Pennsylvania United States
No abstract available
来源: 评论
Refactoring programs to secure information flows
Refactoring programs to secure information flows
收藏 引用
plas 2006 - 2006 programming languages and analysis for security workshop
作者: Smith, Scott F. Thober, Mark Johns Hopkins University United States
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how refactoring programs into distinct compo... 详细信息
来源: 评论
A microkernel virtual machine: Building security with clear interfaces
A microkernel virtual machine: Building security with clear ...
收藏 引用
plas 2006 - 2006 programming languages and analysis for security workshop
作者: Lu, Xiaoqi Smith, Scott F. Department of Computer Science Johns Hopkins University
In this paper we propose a novel microkernel-based virtual machine (μKVM), a new code-based security framework with a simple and declarative security architecture. The main design goals of the μKVM are to put a clea... 详细信息
来源: 评论