The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Marco Pistoia: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Marco Pistoia, Robert J. Flynn, Larry Koved, Vugranam C. Sreedhar
    Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection. [Citation Graph (0, 0)][DBLP]
    ECOOP, 2005, pp:362-386 [Conf]
  2. Marco Pistoia, Stephen J. Fink, Robert J. Flynn, Eran Yahav
    When Role Models Have Flaws: Static Validation of Enterprise Security Policies. [Citation Graph (0, 0)][DBLP]
    ICSE, 2007, pp:478-488 [Conf]
  3. Paolina Centonze, Gleb Naumovich, Stephen J. Fink, Marco Pistoia
    Role-Based access control consistency validation. [Citation Graph (0, 0)][DBLP]
    ISSTA, 2006, pp:121-132 [Conf]
  4. Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Weber, Trent Jaeger, Guillaume Marceau, Liangzhao Zeng
    The case for analysis preserving language transformation. [Citation Graph (0, 0)][DBLP]
    ISSTA, 2006, pp:191-202 [Conf]
  5. Larry Koved, Marco Pistoia, Aaron Kershenbaum
    Access rights analysis for Java. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 2002, pp:359-372 [Conf]
  6. Marco Pistoia, Anindya Banerjee, David A. Naumann
    Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:149-163 [Conf]
  7. Magda Mourad, Jonathan Munson, Tamer Nadeem, Giovanni Pacifici, Marco Pistoia, Alaa Youssef
    WebGuard: A System for Web Content Protection. [Citation Graph (0, 0)][DBLP]
    WWW Posters, 2001, pp:- [Conf]
  8. Larry Koved, Anthony J. Nadalin, Nataraj Nagaratnam, Marco Pistoia, Theodore Shrader
    Security challenges for Enterprise Java in an e-business environment. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 2001, v:40, n:1, pp:130-0 [Journal]
  9. Marco Pistoia, Francesco Logozzo
    Program Analysis for Security and Privacy. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 2006, pp:59-68 [Conf]
  10. Sharon Shoham, Eran Yahav, Stephen Fink, Marco Pistoia
    Static specification mining using automata-based abstractions. [Citation Graph (0, 0)][DBLP]
    ISSTA, 2007, pp:174-184 [Conf]

  11. Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies. [Citation Graph (, )][DBLP]


  12. Modular string-sensitive permission analysis with demand-driven precision. [Citation Graph (, )][DBLP]


  13. Practical fault localization for dynamic web applications. [Citation Graph (, )][DBLP]


  14. Directed test generation for effective fault localization. [Citation Graph (, )][DBLP]


  15. TAJ: effective taint analysis of web applications. [Citation Graph (, )][DBLP]


  16. A language for information flow: dynamic tracking in multiple interdependent dimensions. [Citation Graph (, )][DBLP]


  17. Program Analysis and Programming Languages for Security. [Citation Graph (, )][DBLP]


Search in 0.239secs, Finished in 0.240secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002