Controlling Data Flow with a Policy-Based Programming Language for the Web (Englisch)
- Neue Suche nach: Sans, Thierry
- Neue Suche nach: Cervesato, Iliano
- Neue Suche nach: Hussein, Soha
- Neue Suche nach: Sans, Thierry
- Neue Suche nach: Cervesato, Iliano
- Neue Suche nach: Hussein, Soha
In:
Secure IT Systems
6
;
215-230
;
2013
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Controlling Data Flow with a Policy-Based Programming Language for the Web
-
Beteiligte:
-
Erschienen in:Secure IT Systems , 6 ; 215-230Lecture Notes in Computer Science ; 8208, 6 ; 215-230
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2013
-
Format / Umfang:16 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNsMauro, Alessio / Fafoutis, Xenofon / Mödersheim, Sebastian / Dragoni, Nicola et al. | 2013
- 17
-
Security Games for Cyber-Physical SystemsVigo, Roberto / Bruni, Alessandro / Yüksel, Ender et al. | 2013
- 33
-
Prevent Session Hijacking by Binding the Session to the Cryptographic Network CredentialsBurgers, Willem / Verdult, Roel / Eekelen, Marko et al. | 2013
- 51
-
Inferring Required Permissions for Statically Composed ProgramsHasu, Tero / Bagge, Anya Helene / Haveraaen, Magne et al. | 2013
- 67
-
SafeScript: JavaScript Transformation for Policy EnforcementTer Louw, Mike / Phung, Phu H. / Krishnamurti, Rohini / Venkatakrishnan, Venkat N. et al. | 2013
- 84
-
A Logic for Information Flow Analysis of Distributed ProgramsBalliu, Musard et al. | 2013
- 100
-
Dynamics and Secure Information Flow for a Higher-Order Pi-CalculusPettai, Martin / Laud, Peeter et al. | 2013
- 116
-
Lazy Programs Leak SecretsBuiras, Pablo / Russo, Alejandro et al. | 2013
- 123
-
High-Performance Qualified Digital Signatures for X-RoadAnsper, Arne / Buldas, Ahto / Freudenthal, Margus / Willemson, Jan et al. | 2013
- 139
-
Identification and Evaluation of Security Activities in Agile ProjectsAyalew, Tigist / Kidane, Tigist / Carlsson, Bengt et al. | 2013
- 154
-
PeerShare: A System Secure Distribution of Sensitive Data among Social ContactsNagy, Marcin / Asokan, N. / Ott, Jörg et al. | 2013
- 166
-
Resilience of Process Control Systems to Cyber-Physical AttacksKrotofil, Marina / Cárdenas, Alvaro A. et al. | 2013
- 183
-
Femtocell Security in Theory and PracticeBroek, Fabian / Wichers Schreur, Ronny et al. | 2013
- 199
-
Security Analysis of Building Automation NetworksAntonini, Alessio / Barenghi, Alessandro / Pelosi, Gerardo et al. | 2013
- 215
-
Controlling Data Flow with a Policy-Based Programming Language for the WebSans, Thierry / Cervesato, Iliano / Hussein, Soha et al. | 2013
- 231
-
A Survey on Control-Flow Integrity Means in Web Application FrameworksBraun, Bastian / Pollak, Christian v. / Posegga, Joachim et al. | 2013
- 247
-
Incremental Hyperproperty Model Checking via GamesMilushev, Dimiter / Clarke, Dave et al. | 2013
- 263
-
Graph k-Anonymity through k-Means and as Modular DecompositionStokes, Klara et al. | 2013
- 279
-
Domain-Based Storage Protection (DBSP) in Public Infrastructure CloudsPaladi, Nicolae / Gehrmann, Christian / Morenius, Fredric et al. | 2013
- 297
-
An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS PoliciesHachem, Nabil / Garcia-Alfaro, Joaquin / Debar, Hervé et al. | 2013
- 313
-
Keyless Signatures’ Infrastructure: How to Build Global Distributed Hash-TreesBuldas, Ahto / Kroonmaa, Andres / Laanoja, Risto et al. | 2013