Computability Classes for Enforcement Mechanisms (2003)

by Kevin W. Hamlen , Greg Morrisett , Fred B. Schneider
Venue:ACM Transactions on Programming Languages and Systems
Citations:79 - 18 self

Documents Related by Co-Citation

467 Enforceable Security Policies – Fred B. Schneider
93 Edit automata: Enforcement mechanisms for run-time security policies – Jay Ligatti, Lujo Bauer, David Walker - 2005
209 SASI Enforcement of Security Policies: A Retrospective – Ulfar Erlingsson , Fred B. Schneider - 2000
152 Policy-directed code safety – David E. Evans - 2000
35 Certified in-lined reference monitoring on .net – K W Hamlen, G Morrisett, F B Schneider - 2006
142 IRM Enforcement of Java Stack Inspection – Ulfar Erlingsson, Fred B. Schneider - 2000
179 Recognizing Safety and Liveness – Bowen Alpern, Bowen Alpera, Fred B. Schneider, Fred B. Schneider - 1986
27 Foundations for the Run-time Analysis of Software Systems – Mahesh Viswanathan - 2000
52 Access control by tracking shallow execution history – Philip W. L. Fong - 2004
721 Security policies and security models – J A Goguen, J Meseguer - 1982
1080 An Overview of AspectJ – Gregor Kiczales, Erik Hilsdale, Jim Hugunin, Mik Kersten, Jeffrey Palm, William G. Griswold - 2001
305 Proving the Correctness of Multiprocess Programs – Leslie Lamport - 1977
60 Composing security policies with Polymer – Lujo Bauer - 2005
72 The Inlined Reference Monitor Approach to Security Policy Enforcement – U Erlingsson - 2003
99 Access Control based on Execution History – Martin Abadi, Cedric Fournet - 2003
45 More Enforceable Security Policies – Lujo Bauer, Jarred Ligatti, David Walker - 2002
1097 Proof-Carrying Code – George C. Necula - 1997
22 Aspect-oriented in-lined reference monitors – Meera Sridhar, Kevin W. Hamlen - 2008
44 Formally Specified Monitoring of Temporal Properties – Moonjoo Kim, Mahesh Viswanathan, HanĂȘne Ben-Abdallah, Sampath Kannan, Insup Lee, Oleg Sokolsky - 1999