|
Search the dblp DataBase
Marco Pistoia:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Marco Pistoia, Robert J. Flynn, Larry Koved, Vugranam C. Sreedhar
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection. [Citation Graph (0, 0)][DBLP] ECOOP, 2005, pp:362-386 [Conf]
- Marco Pistoia, Stephen J. Fink, Robert J. Flynn, Eran Yahav
When Role Models Have Flaws: Static Validation of Enterprise Security Policies. [Citation Graph (0, 0)][DBLP] ICSE, 2007, pp:478-488 [Conf]
- Paolina Centonze, Gleb Naumovich, Stephen J. Fink, Marco Pistoia
Role-Based access control consistency validation. [Citation Graph (0, 0)][DBLP] ISSTA, 2006, pp:121-132 [Conf]
- Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Weber, Trent Jaeger, Guillaume Marceau, Liangzhao Zeng
The case for analysis preserving language transformation. [Citation Graph (0, 0)][DBLP] ISSTA, 2006, pp:191-202 [Conf]
- Larry Koved, Marco Pistoia, Aaron Kershenbaum
Access rights analysis for Java. [Citation Graph (0, 0)][DBLP] OOPSLA, 2002, pp:359-372 [Conf]
- Marco Pistoia, Anindya Banerjee, David A. Naumann
Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2007, pp:149-163 [Conf]
- Magda Mourad, Jonathan Munson, Tamer Nadeem, Giovanni Pacifici, Marco Pistoia, Alaa Youssef
WebGuard: A System for Web Content Protection. [Citation Graph (0, 0)][DBLP] WWW Posters, 2001, pp:- [Conf]
- Larry Koved, Anthony J. Nadalin, Nataraj Nagaratnam, Marco Pistoia, Theodore Shrader
Security challenges for Enterprise Java in an e-business environment. [Citation Graph (0, 0)][DBLP] IBM Systems Journal, 2001, v:40, n:1, pp:130-0 [Journal]
- Marco Pistoia, Francesco Logozzo
Program Analysis for Security and Privacy. [Citation Graph (0, 0)][DBLP] ECOOP Workshops, 2006, pp:59-68 [Conf]
- Sharon Shoham, Eran Yahav, Stephen Fink, Marco Pistoia
Static specification mining using automata-based abstractions. [Citation Graph (0, 0)][DBLP] ISSTA, 2007, pp:174-184 [Conf]
Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies. [Citation Graph (, )][DBLP]
Modular string-sensitive permission analysis with demand-driven precision. [Citation Graph (, )][DBLP]
Practical fault localization for dynamic web applications. [Citation Graph (, )][DBLP]
Directed test generation for effective fault localization. [Citation Graph (, )][DBLP]
TAJ: effective taint analysis of web applications. [Citation Graph (, )][DBLP]
A language for information flow: dynamic tracking in multiple interdependent dimensions. [Citation Graph (, )][DBLP]
Program Analysis and Programming Languages for Security. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs
|