Documents Related by Co-Citation

209 SASI Enforcement of Security Policies: A Retrospective – Ulfar Erlingsson , Fred B. Schneider - 2000
467 Enforceable Security Policies – Fred B. Schneider
142 IRM Enforcement of Java Stack Inspection – Ulfar Erlingsson, Fred B. Schneider - 2000
1097 Proof-Carrying Code – George C. Necula - 1997
1073 F.: The Java Virtual Machine Specification – T Lindholm, Yellin - 1999
684 Efficient Software-Based Fault Isolation – Robert Wahbe, Steven Lucco, Thomas E. Anderson, Susan L. Graham - 1993
449 JFlow: Practical Mostly-Static Information Flow Control – Andrew C. Myers - 1999
1080 An Overview of AspectJ – Gregor Kiczales, Erik Hilsdale, Jim Hugunin, Mik Kersten, Jeffrey Palm, William G. Griswold - 2001
618 The Protection of Information in Computer Systems – Jerome H. Saltzer, Michael D. Schroeder - 1975
588 From System F to Typed Assembly Language – Greg Morrisett, David Walker, Karl Crary, Neal Glew - 1998
271 The Design and Implementation of a Certifying Compiler – George C. Necula , Peter Lee - 1998
44 Formally Specified Monitoring of Temporal Properties – Moonjoo Kim, Mahesh Viswanathan, HanĂȘne Ben-Abdallah, Sampath Kannan, Insup Lee, Oleg Sokolsky - 1999
179 Recognizing Safety and Liveness – Bowen Alpern, Bowen Alpera, Fred B. Schneider, Fred B. Schneider - 1986
103 Automatic Program Transformation with JOIE – Geoff A. Cohen, Jeffrey S. Chase, David L. Kaminsky - 1998
19 Distributed Safety Controllers for Web Services – Anders B. Sandholm, Michael I. Schwartzbach - 1997
71 MiSFIT: A Tool for Construction Safe Extensible C++ Systems – Christopher Small, Christopher Small - 1997
45 More Enforceable Security Policies – Lujo Bauer, Jarred Ligatti, David Walker - 2002
27 Foundations for the Run-time Analysis of Software Systems – Mahesh Viswanathan - 2000
64 History-based Access Control for Mobile Code – Guy Edjlali , Anurag Acharya, Vipin Chaudhary - 1998