Role-based access control on the Web using Java
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Enforcing trace properties by program transformation
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Static enforcement of security with types
ICFP '00 Proceedings of the fifth ACM SIGPLAN international conference on Functional programming
Separating access control policy, enforcement, and functionality in extensible systems
ACM Transactions on Computer Systems (TOCS)
Formalizing the safety of Java, the Java virtual machine, and Java card
ACM Computing Surveys (CSUR)
Security in mobile agent system: problems and approaches
ACM SIGOPS Operating Systems Review
Secure calling contexts for stack inspection
Proceedings of the 4th ACM SIGPLAN international conference on Principles and practice of declarative programming
Access rights analysis for Java
OOPSLA '02 Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
A Systematic Approach to Static Access Control
ESOP '01 Proceedings of the 10th European Symposium on Programming Languages and Systems
Interfaces for stack inspection
Journal of Functional Programming
A systematic approach to static access control
ACM Transactions on Programming Languages and Systems (TOPLAS)
Chinese wall security for decentralized workflow management systems
Journal of Computer Security - Special issue on ACM conference on computer and communications security, 2001
Trust but verify: authorization for web services
SWS '04 Proceedings of the 2004 workshop on Secure web service
Software integrity protection using timed executable agents
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Component-based access control: secure software composition through static analysis
SC'08 Proceedings of the 7th international conference on Software composition
Enhancing Java security with history based access control
Foundations of security analysis and design IV
A semantic data validation service for web applications
Journal of Theoretical and Applied Electronic Commerce Research
Space-efficient gradual typing
Higher-Order and Symbolic Computation
Interprocedural analysis for privileged code placement and tainted variable detection
ECOOP'05 Proceedings of the 19th European conference on Object-Oriented Programming
Proceedings of the 2012 Haskell Symposium
Hi-index | 0.00 |