Volltext-Artikel, eBooks und vieles mehr aus dem EBSCO Discovery Service

Das Gesuchte nicht gefunden? Schauen Sie in der Onleihe oder machen Sie einen Kaufvorschlag

Treffer 61 - 80 von 167

61

Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations.
Dimitrakos, Theo ; Martinelli, Fabio ; Ryan, Peter Y. A. ; et al.
Formal Aspects in Security & Trust (9783540326281). 2006, p63-80. 18p.

Buch
62

Verified Bytecode Subroutines.
Klein, Gerwin ; Wildmoser, Martin
Theorem Proving in Higher Order Logics (9783540406648). 2003, p55-70. 16p.

Buch
63

Average case vs. worst case : margins of safety in system design
Probst, Christian W. ; Gal, Andreas ; Franz, Michael
Proceedings of the 2005 workshop on New security paradigms. :25-32

Konferenz
64

Language-Based Security.
Goos, Gerhard ; Hartmanis, Juris ; van Leeuwen, Jan ; et al.
Mathematical Foundations of Computer Science 1999. 1999, p284-298. 15p.

Buch
65

Proof linking : an architecture for modular verification of dynamically-linked mobile code
Fong, Philip W. L. ; Cameron, Robert D.
Proceedings of the 6th ACM SIGSOFT international symposium on Foundations of software engineering. :222-230

Konferenz
67

Proof linking : modular verification of mobile programs in the presence of lazy, dynamic linking
Fong, Philip W. L. ; Cameron, Robert D.
ACM Transactions on Software Engineering and Methodology (TOSEM). 9(4):379-409

Fachzeitschrift
68

Dieses Ergebnis kann Gästen nicht angezeigt werden.

69

Bytecode 2005 Preliminary Version Kleene Algebra and Bytecode Verification
̷lucja Kot Dexter Kozen ; The Pennsylvania State University CiteSeerX Archives
http://www.cs.cornell.edu/~kozen/papers/Bytecode.pdf.

Key words Java bytecode verification static analysis abstract
Fachzeitschrift
70

Bytecode 2005 Preliminary Version Kleene Algebra and Bytecode Verification Abstract
̷lucja Kot Dexter Kozen ; The Pennsylvania State University CiteSeerX Archives
http://www.cs.cornell.edu/~lucja/Publications/Bytecode.pdf.

Key words Java bytecode verification static analysis abstract
Fachzeitschrift
71

Result Certification of Static Program Analysers with Automated Theorem Provers
Besson, Frédéric ; Cornilleau, Pierre-Emmanuel ; Jensen, Thomas ; et al.
VSTTE 2013 - Fifth Working Conference on Verified Software: Theories, Tools and Experiments ; https://inria.hal.science/hal-00924167 ; VSTTE 2013 - Fifth Working Conference on Verified Software: Theories, Tools and Experiments, 2013, Atherthon, United States

Atherthon United States [INFO.INFO-PL]Computer S...
Konferenz
72

Instruction-level security typing by abstract interpretation
Francesco, Nicoletta ; Martini, Luca
International Journal of Information Security. March, 2007, Vol. 6 Issue 2-3, p85, 22 p.

Fachzeitschrift
73
74

Type elaboration and subtype completion for Java bytecode
Knoblock, Todd B. ; Rehof, Jakob
ACM Transactions on Programming Languages & Systems. March, 2001, Vol. 23 Issue 2, p243, 30 p.

Fachzeitschrift
75

Space-Aware Data Flow Analysis
C. Bernardeschi ; G. Lettieri ; L. Martini ; et al.
http://www.ing.unipi.it/~o1103499/papers/IET-05-03.pdf.

Algorithms Data flow analysis Proof system
Fachzeitschrift
76

Average case vs. worst case: Margins of safety in system design
Christian W. Probst ; Informatics ; The Pennsylvania State University CiteSeerX Archives
http://www.nspw.org/papers/2005/nspw2005-probst.pdf.

Fachzeitschrift
78

Bytecode Verification by Model Checking
David Basin ; Stefan Friedrich ; Marek Gawkowski ; et al.
http://wailoa.informatik.uni-freiburg.de/WebBIB/publications/papers/2003/1_BFGbvjar.pdf.

Static analysis model checking type safety bytecode verification
Fachzeitschrift
80

Verified Bytecode Subroutines
Gerwin Klein ; Martin Wildmoser ; Technische Universität München ; et al.
http://www4.in.tum.de/publ/papers/KleinW-TPHOLs03.pdf.

Fachzeitschrift

Filter