|
Conferences in DBLP
Simulating midlet's security claims with automata modulo theory. [Citation Graph (, )][DBLP]
Aspect-oriented in-lined reference monitors. [Citation Graph (, )][DBLP]
Verified enforcement of stateful information release policies. [Citation Graph (, )][DBLP]
A compiler-based infrastructure for software-protection. [Citation Graph (, )][DBLP]
A security domain model to assess software for exploitable covert channels. [Citation Graph (, )][DBLP]
Static path conditions for Java. [Citation Graph (, )][DBLP]
Resource bound analysis for database queries. [Citation Graph (, )][DBLP]
Evaluating the cost reduction of static code analysis for software security. [Citation Graph (, )][DBLP]
A type system for data-flow integrity on windows vista. [Citation Graph (, )][DBLP]
Dominator-tree analysis for distributed authorization. [Citation Graph (, )][DBLP]
Information flow security of multi-threaded distributed programs. [Citation Graph (, )][DBLP]
Securing nonintrusive web encryption through information flow. [Citation Graph (, )][DBLP]
Lagrange multipliers and maximum information leakage in different observational models. [Citation Graph (, )][DBLP]
|