LogicFence: A Framework for Enforcing Global Integrity Constraints at Runtime
暂无分享,去创建一个
[1] Srinath Srinivasa,et al. An algebra of fixpoints for characterizing interactive behavior of information systems , 2001 .
[2] Úlfar Erlingsson,et al. SASI enforcement of security policies: a retrospective , 1999, NSPW '99.
[3] Fred B. Schneider,et al. Enforceable security policies , 2000, TSEC.
[4] Farhad Arbab,et al. An overview of manifold and its implementation , 1993, Concurr. Pract. Exp..
[5] Farhad Arbab,et al. Coordination Models and Languages , 1998, Adv. Comput..
[6] Naftaly H. Minsky,et al. Law-Governed Linda as a Coordination Model , 1994, ECOOP Workshop.
[7] C. R. Ramakrishnan,et al. Model-Carrying Code (MCC): a new paradigm for mobile-code security , 2001, NSPW '01.
[8] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[9] Robert Tolksdorf. Coordinating Services in Open Distributed Systems with LAURA , 1996, COORDINATION.
[10] Nicholas Carriero,et al. Linda and Friends , 1986, Computer.