Abstract is missing.
- Object capabilities for securityDavid Wagner. 1-2 [doi]
- Applying flow-sensitive CQUAL to verify MINIX authorization check placementTimothy Fraser, Nick L. Petroni Jr., William A. Arbaugh. 3-6 [doi]
- Certified In-lined Reference Monitoring on .NETKevin W. Hamlen, Greg Morrisett, Fred B. Schneider. 7-16 [doi]
- Combining type-based analysis and model checking for finding counterexamples against non-interferenceHiroshi Unno, Naoki Kobayashi, Akinori Yonezawa. 17-26 [doi]
- Precise alias analysis for static detection of web application vulnerabilitiesNenad Jovanovic, Christopher Kruegel, Engin Kirda. 27-36 [doi]
- Specifying distributed trust management in LolliMonJeff Polakow, Christian Skalka. 37-46 [doi]
- A microkernel virtual machine: : building security with clear interfacesXiaoqi Lu, Scott F. Smith. 47-56 [doi]
- Empirical relation between coupling and attackability in software systems: : a case study on DOSMichael Yanguo Liu, Issa Traoré. 57-64 [doi]
- Trusted declassification: : high-level policy for a security-typed languageBoniface Hicks, Dave King 0002, Patrick McDaniel, Michael Hicks. 65-74 [doi]
- Refactoring programs to secure information flowsScott F. Smith, Mark Thober. 75-84 [doi]
- Efficient type inference for secure information flowKatia Hristova, Tom Rothamel, Yanhong A. Liu, Scott D. Stoller. 85-94 [doi]