Method Inlining in Presence of Stack Inspection
暂无分享,去创建一个
Massimo Bartoletti | Gian-Luigi Ferrari | Pierpaolo Degano | Massimo Bartoletti | G. Ferrari | P. Degano
[1] C. R. Ramakrishnan,et al. Evaluating Inlining Techniques , 1998, Comput. Lang..
[2] Marco Pistoia,et al. Access rights analysis for Java , 2002, OOPSLA '02.
[3] Gian Luigi Ferrari,et al. Stack inspection and secure program transformations , 2004, International Journal of Information Security.
[4] Scott F. Smith,et al. A Systematic Approach to Static Access Control , 2001, ESOP.
[5] Flemming Nielson,et al. Principles of Program Analysis , 1999, Springer Berlin Heidelberg.
[6] Javier Esparza,et al. Model checking LTL with regular valuations for pushdown systems , 2001, Inf. Comput..
[7] Massimo Bartoletti,et al. Static Analysis for Eager Stack Inspection , 2003 .
[8] Gian Luigi Ferrari,et al. Security-Aware Program Transformations , 2003, ICTCS.
[9] David Grove,et al. A framework for call graph construction algorithms , 2001, TOPL.
[10] Li Gong,et al. Inside Java 2 Platform Security: Architecture, API Design, and Implementation , 1999 .
[11] Cédric Fournet,et al. Stack inspection: Theory and variants , 2003, TOPL.
[12] Martín Abadi,et al. A calculus for access control in distributed systems , 1991, TOPL.
[13] Thomas P. Jensen,et al. Secure calling contexts for stack inspection , 2002, PPDP '02.
[14] Matthias Felleisen,et al. A Tail-Recursive Semantics for Stack Inspections , 2003, ESOP.
[15] Gian Luigi Ferrari,et al. Static Analysis for Stack Inspection , 2001, Electron. Notes Theor. Comput. Sci..
[16] Gian Luigi Ferrari,et al. Program Transformations under Dynamic Security Policies , 2004, MEFISTO.
[17] Lori L. Pollock,et al. Incremental call graph reanalysis for object-oriented software maintenance , 2001, Proceedings IEEE International Conference on Software Maintenance. ICSM 2001.
[18] Andrew W. Appel,et al. SAFKASI: a security mechanism for language-based systems , 2000, TSEM.
[19] Úlfar Erlingsson,et al. IRM enforcement of Java stack inspection , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.