Information Flow Analysis of Web Service Net
暂无分享,去创建一个
[1] Gregor Snelting,et al. Efficient path conditions in dependence graphs for software safety analysis , 2006, TSEM.
[2] Xiaohong Li,et al. A Unified Threat Model for Assessing Threat in Web Applications , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[3] Matthew B. Dwyer,et al. Bandera: extracting finite-state models from Java source code , 2000, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.
[4] Shi Wei. SOAP-based Fundamental Security Specification of Web Service(WS-Security) , 2003 .
[5] David Eichmann,et al. Program and interface slicing for reverse engineering , 1993, [1993] Proceedings Working Conference on Reverse Engineering.
[6] Bogdan Korel,et al. Program slicing in understanding of large programs , 1998, Proceedings. 6th International Workshop on Program Comprehension. IWPC'98 (Cat. No.98TB100242).
[7] Zheng Guo-liang. An Approach for Hierarchy Slicing Object-Oriented Program , 2001 .
[8] Keith Brian Gallagher,et al. Using Program Slicing in Software Maintenance , 1991, IEEE Trans. Software Eng..
[9] James R. Larus,et al. Using Tracing and Dynamic Slicing to Tune Compilers , 1993 .
[10] Mario Piattini,et al. PWSSec: Process for Web Services Security , 2006, 2006 IEEE International Conference on Web Services (ICWS'06).