咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 8 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 7 篇 计算机科学与技术...
    • 3 篇 电气工程
    • 2 篇 信息与通信工程
    • 2 篇 软件工程
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 8 篇 proof carrying c...
  • 3 篇 security
  • 1 篇 inlined referenc...
  • 1 篇 bytecode
  • 1 篇 lambda -calculus
  • 1 篇 leantap
  • 1 篇 sandbox
  • 1 篇 sasi
  • 1 篇 bytecode verific...
  • 1 篇 greg morrisett
  • 1 篇 component compos...
  • 1 篇 pervasive comput...
  • 1 篇 program transfor...
  • 1 篇 formal languages
  • 1 篇 java
  • 1 篇 certification
  • 1 篇 programs from pr...
  • 1 篇 assurance cases
  • 1 篇 gary mc graw
  • 1 篇 model checkers

机构

  • 2 篇 univ paderborn d...
  • 1 篇 liverpool john m...
  • 1 篇 cigital
  • 1 篇 natl inst adv in...
  • 1 篇 deutsch telekom ...
  • 1 篇 australian natl ...
  • 1 篇 nihon univ coll ...
  • 1 篇 australian natl ...
  • 1 篇 tech univ munich...
  • 1 篇 gunma prefectura...
  • 1 篇 cornell universi...

作者

  • 1 篇 posegga j
  • 1 篇 merabti m
  • 1 篇 shi q
  • 1 篇 hosokawa yuichir...
  • 1 篇 llewellyn-jones ...
  • 1 篇 matsuno yutaka
  • 1 篇 yamagata yoriyuk...
  • 1 篇 nishihara hideak...
  • 1 篇 nipkow tobias
  • 1 篇 goré r
  • 1 篇 wildmoser martin
  • 1 篇 kastens uwe
  • 1 篇 mcgraw gary
  • 1 篇 jakobs marie-chr...
  • 1 篇 askwith b
  • 1 篇 schneider fred b...
  • 1 篇 klohs karsten
  • 1 篇 chaieb amine
  • 1 篇 wehrheim heike
  • 1 篇 slater a

语言

  • 6 篇 英文
  • 2 篇 其他
检索条件"主题词=Proof carrying code"
8 条 记 录,以下是1-10 订阅
排序:
Bytecode Analysis for proof carrying code
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2005年 第1期141卷 19-34页
作者: Wildmoser, Martin Chaieb, Amine Nipkow, Tobias Tech Univ Munich Inst Informat Munich Germany
Out of annotated programs proof carrying code systems construct and prove verification conditions that guarantee a given safety policy. The annotations may come from various program analyzers and must not be trusted a... 详细信息
来源: 评论
Assurance carrying code for Software Supply Chain  32
Assurance Carrying Code for Software Supply Chain
收藏 引用
32nd IEEE International Symposium on Software Reliability Engineering (ISSRE)
作者: Matsuno, Yutaka Yamagata, Yoriyuki Nishihara, Hideaki Hosokawa, Yuichiro Nihon Univ Coll Sci & Technol Tokyo Japan Natl Inst Adv Ind Sci & Technol Cyber Phys Secur Res Ctr Tokyo Japan Gunma Prefectural Womens Univ Dept Liberal Arts Tamamura Gunma Japan
Modern software systems are composed of software components supplied by a software supply chain, and it has become difficult to maintain the dependability of the software supply chain. To address this problem, we intr... 详细信息
来源: 评论
Silver Bullet Talks with Greg Morrisett
收藏 引用
IEEE SECURITY & PRIVACY 2010年 第5期8卷 6-9页
作者: Mcgraw, Gary Cigital
Gary McGraw interviews Greg Morrisett, the Allen B. Cutting Professor of Computer Science and associate dean for computer science and engineering at Harvard University. His current work is on applications of advanced ... 详细信息
来源: 评论
Programs from proofs of Predicated Dataflow Analyses  15
Programs from Proofs of Predicated Dataflow Analyses
收藏 引用
30th ACM Symposium on Applied Computing (SAC)
作者: Jakobs, Marie-Christine Wehrheim, Heike Univ Paderborn Dept Comp Sci Paderborn Germany
"Programs from proofs" is a generic method which generates new programs out of correctness proofs of given programs. The technique ensures that the new and given program are behaviorally equivalent and that ... 详细信息
来源: 评论
cardTAP:: Automated deduction on a smart card  11th
card<i>T<SUP>A</SUP>P</i>:: Automated deduction on a smart c...
收藏 引用
11th Australian Joint Conference on Artificial Intelligence (AI 98)
作者: Slater, A Goré, R Posegga, J Vogt, H Australian Natl Univ Automated Reasoning Project Canberra ACT 0200 Australia Australian Natl Univ Dept Comp Sci Canberra ACT 0200 Australia Deutsch Telekom AG Technolzentrum IT Secur D-64307 Darmstadt Germany
We present the first implementation of a theorem prover which runs on a smart card. The prover is written in Java and implements a dual tableau calculus.(1) Due to the limited resources available on current smart card... 详细信息
来源: 评论
A security framework for executables in a ubiquitous computing environment
A security framework for executables in a ubiquitous computi...
收藏 引用
IEEE Global Telecommunications Conference (GLOBECOM 04)
作者: Llewellyn-Jones, D Merabti, M Shi, Q Askwith, B Liverpool John Moores Univ Sch Comp & Math Sci Liverpool L3 3AF Merseyside England
The vision of ubiquitous computing presents us with unique difficulties in terms of maintaining security. Many of these relate to privacy or quality of service issues, but underpinning these are the requirement for se... 详细信息
来源: 评论
Enforceable Security Policies
收藏 引用
ACM Transactions on Information and System Security 2000年 第1期3卷 30-50页
作者: Schneider, Fred B. Cornell University Ithaca NY Upson Hall United States
A precise characterization is given for the class of security policies enforceable with mechanisms that work by monitoring system execution, and automata are introduced for specifying exactly that class of security po... 详细信息
来源: 评论
Memory Requirements of Java Bytecode Verification on Limited Devices
收藏 引用
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE 2005年 第1期132卷 95-111页
作者: Klohs, Karsten Kastens, Uwe Univ Paderborn Dept Comp Sci Paderborn Germany
Bytecode verification forms the corner stone of the Java security model that ensures the integrity of the runtime environment even in the presence of untrusted code. Limited devices, like Java smart cards, lack the ne... 详细信息
来源: 评论