The SCEAS System
Navigation Menu

Conferences in DBLP

SIGPLAN Conference on Programming Language Design and Implementation (PLDI) (pldi)
2008 (conf/pldi/2008plas)


  1. Simulating midlet's security claims with automata modulo theory. [Citation Graph (, )][DBLP]


  2. Aspect-oriented in-lined reference monitors. [Citation Graph (, )][DBLP]


  3. Verified enforcement of stateful information release policies. [Citation Graph (, )][DBLP]


  4. A compiler-based infrastructure for software-protection. [Citation Graph (, )][DBLP]


  5. A security domain model to assess software for exploitable covert channels. [Citation Graph (, )][DBLP]


  6. Static path conditions for Java. [Citation Graph (, )][DBLP]


  7. Resource bound analysis for database queries. [Citation Graph (, )][DBLP]


  8. Evaluating the cost reduction of static code analysis for software security. [Citation Graph (, )][DBLP]


  9. A type system for data-flow integrity on windows vista. [Citation Graph (, )][DBLP]


  10. Dominator-tree analysis for distributed authorization. [Citation Graph (, )][DBLP]


  11. Information flow security of multi-threaded distributed programs. [Citation Graph (, )][DBLP]


  12. Securing nonintrusive web encryption through information flow. [Citation Graph (, )][DBLP]


  13. Lagrange multipliers and maximum information leakage in different observational models. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002