咨询与建议

限定检索结果

文献类型

  • 31 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 34 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 31 篇 工学
    • 31 篇 计算机科学与技术...
    • 30 篇 软件工程
    • 2 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 2 篇 安全科学与工程
    • 1 篇 力学(可授工学、理...
  • 18 篇 理学
    • 14 篇 数学
    • 3 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 8 篇 管理学
    • 5 篇 图书情报与档案管...
    • 4 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 法学
    • 1 篇 法学

主题

  • 11 篇 computer program...
  • 3 篇 computer program...
  • 2 篇 runtime
  • 2 篇 security of data
  • 2 篇 context sensitiv...
  • 2 篇 java programming...
  • 2 篇 dynamic programm...
  • 1 篇 object oriented ...
  • 1 篇 associate constr...
  • 1 篇 programming prof...
  • 1 篇 data security
  • 1 篇 access control
  • 1 篇 lattices
  • 1 篇 cross-lingual co...
  • 1 篇 cross-lingual in...
  • 1 篇 automatic progra...
  • 1 篇 computer securit...
  • 1 篇 optimization
  • 1 篇 linear programmi...
  • 1 篇 computer languag...

机构

  • 2 篇 carnegie mellon ...
  • 2 篇 ibm research
  • 1 篇 harvard universi...
  • 1 篇 chinese univ hon...
  • 1 篇 school of electr...
  • 1 篇 school of electr...
  • 1 篇 department of co...
  • 1 篇 university of ca...
  • 1 篇 university of ma...
  • 1 篇 microsoft resear...
  • 1 篇 university of ve...
  • 1 篇 tu wien austria
  • 1 篇 computer systems...
  • 1 篇 computer science...
  • 1 篇 department of co...
  • 1 篇 computer science...
  • 1 篇 university of ca...
  • 1 篇 department of el...
  • 1 篇 university of ma...
  • 1 篇 university of pe...

作者

  • 3 篇 hicks michael
  • 2 篇 smith scott f.
  • 1 篇 liu yanhong a.
  • 1 篇 erlingsson úlfar
  • 1 篇 spoonhower danie...
  • 1 篇 mcdaniel patrick
  • 1 篇 polakow jeff
  • 1 篇 ahmed el-mahdy
  • 1 篇 bridges matthew ...
  • 1 篇 raman easwaran
  • 1 篇 cheng perry
  • 1 篇 stoyle gareth
  • 1 篇 bhansali sanjay
  • 1 篇 liu michael yang...
  • 1 篇 hristova katia
  • 1 篇 siek jeremy
  • 1 篇 unno hiroshi
  • 1 篇 rothamel tom
  • 1 篇 blelloch guy e.
  • 1 篇 casey kevin

语言

  • 34 篇 英文
检索条件"任意字段=PLAS 2006 - 2006 Programming Languages and Analysis for Security Workshop"
34 条 记 录,以下是11-20 订阅
排序:
Certified in-lined reference monitoring on .NET
Certified in-lined reference monitoring on .NET
收藏 引用
plas 2006 - 2006 programming languages and analysis for security workshop
作者: Hamlen, Kevin W. Morrisett, Greg Schneider, Fred B. Cornell University United States Harvard University United States
Mobile is an extension of the .NET Common Intermediate Language that supports certified In-Lined Reference Monitoring. Mobile programs have the useful property that if they are well-typed with respect to a declared se... 详细信息
来源: 评论
Specifying distributed trust management in LolliMon
Specifying distributed trust management in LolliMon
收藏 引用
plas 2006 - 2006 programming languages and analysis for security workshop
作者: Polakow, Jeff Skalka, Christian Harvey Mudd College United States University of Vermont United States
We propose the monadic linear logic programming language LolliMon as a new foundation for the specification of distributed trust management systems, particularly the RT framework. LolliMon possesses features that make... 详细信息
来源: 评论
Object capabilities for security
Object capabilities for security
收藏 引用
plas 2006 - 2006 programming languages and analysis for security workshop
作者: Wagner, David Computer Science Division University of California Berkeley United States
Existing systems often do a poor job of meeting the principle of least privilege. I will discuss how object capability systems and language-based methods can help address this shortcoming. In language-based object cap... 详细信息
来源: 评论
Trusted declassification: High-level policy for a security-typed language
Trusted declassification: High-level policy for a security-t...
收藏 引用
plas 2006 - 2006 programming languages and analysis for security workshop
作者: Hicks, Boniface King, Dave McDaniel, Patrick Hicks, Michael Penn State University University of Maryland
security-typed languages promise to be a powerful tool with which provably secure software applications may be developed. Programs written in these languages enforce a strong, global policy of noninterference which en... 详细信息
来源: 评论
Combining type-based analysis and model checking for finding counterexamples against non-interference
Combining type-based analysis and model checking for finding...
收藏 引用
plas 2006 - 2006 programming languages and analysis for security workshop
作者: Unno, Hiroshi Kobayashi, Naoki Yonezawa, Akinori University of Tokyo Japan Tohoku University Japan
Type systems for secure information flow are useful for efficiently checking that programs have secure information flow. They are, however, conservative, so that they often reject safe programs as ill-typed. According... 详细信息
来源: 评论
Precise alias analysis for static detection of web application vulnerabilities
Precise alias analysis for static detection of web applicati...
收藏 引用
plas 2006 - 2006 programming languages and analysis for security workshop
作者: Jovanovic, Nenad Kruegel, Christopher Kirda, Engin Secure Systems Lab. Technical University of Vienna Austria
The number and the importance of web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applications have grown as well. Since manual... 详细信息
来源: 评论
Efficient type inference for secure information flow
Efficient type inference for secure information flow
收藏 引用
plas 2006 - 2006 programming languages and analysis for security workshop
作者: Hristova, Katia Rothamel, Tom Liu, Yanhong A. Stoller, Scott D. Computer Science Department State University of New York Stony Brook NY 11794 United States
This paper describes the design, analysis, and implementation of an efficient algorithm for information flow analysis expressed using a type system. Given a program and an environment of security classes for informati... 详细信息
来源: 评论
Empirical relation between coupling and attackability in software systems: A case study on DOS
Empirical relation between coupling and attackability in sof...
收藏 引用
plas 2006 - 2006 programming languages and analysis for security workshop
作者: Liu, Michael Yanguo Traore, Issa Department of Electrical and Computer Engineering University of Victoria STN CSC PO Box 3055 Victoria BC V8W 3P6 Canada
Over the last decades, software quality attributes such as maintainability, reliability, and understandability have been widely studied. In contrast, less attention has been paid to the field of software security. Att... 详细信息
来源: 评论
Effective static race detection for Java  06
Effective static race detection for Java
收藏 引用
ACM SIGPLAN Conference on programming Language Design and Implementation, PLDI 2006 - plas 2006: 2006 programming languages and analysis for security workshop
作者: Naik, Mayur Aiken, Alex Whaley, John Computer Science Department Stanford University United States
We present a novel technique for static race detection in Java programs, comprised of a series of stages that employ a combination of static analyses to successively reduce the pairs of memory accesses potentially inv... 详细信息
来源: 评论
An experimental analysis of self-adjusting computation  06
An experimental analysis of self-adjusting computation
收藏 引用
ACM SIGPLAN Conference on programming Language Design and Implementation, PLDI 2006 - plas 2006: 2006 programming languages and analysis for security workshop
作者: Acar, Umut A. Blelloch, Guy E. Blume, Matthias Tangwongsan, Kanat Toyota Technological Institute Japan Carnegie Mellon University United States
Dependence graphs and memoization can be used to efficiently update the output of a program as the input changes dynamically. Recent work has studied techniques for combining these approaches to effectively dynamize a... 详细信息
来源: 评论