共 19 条
[1]
Alpern B., Schneider F., Recognizing safety and liveness, Distrib. Comput., 2, pp. 117-126, (1987)
[2]
Bauer L., Ligatti J., Walker D., More enforceable security policies, Foundations of Computer Security, pp. 95-104, (2002)
[3]
Bauer L., Ligatti J., Walker D., A language and system for enforcing run-time security policies, Technical Report TR-699-04, (2004)
[4]
Colcombet T., Fradet P., Enforcing trace properties by program transformation, Proceedings of the 27th ACM Symposium on Principles of Programming Languages, pp. 54-66, (2000)
[5]
Elmasri R., Navathe S.B., Fundamentals of Database Systems, (1994)
[6]
Evans D., Twyman A., Flexible policy-directed code safety, Proceedings of the 1999 IEEE Symposium on Security and Privacy, (1999)
[7]
Fong P.W.L., Access control by tracking shallow execution history, Proceedings of the 2004 IEEE Symposium on Security and Privacy, (2004)
[8]
Hamlen K., Morrisett G., Schneider F., Computability classes for enforcement mechanisms, Technical Report TR2003-1908, (2003)
[9]
Kiczales G., Hilsdale E., Hugunin J., Kersten M., Palm J., Griswold W., An overview of AspectJ, Proceedings of the European Conference on Object-Oriented Programming, (2001)
[10]
Kim M., Kannan S., Lee I., Sokolsky O., Viswantathan M., Computational analysis of run-time monitoring - Fundamentals of Java-MaC, Electronic Notes in Theoretical Computer Science, 70, (2002)