Abstract is missing.
- Simulating midlet s security claims with automata modulo theoryFabio Massacci, Ida Siahaan. 1-9 [doi]
- Aspect-oriented in-lined reference monitorsKevin W. Hamlen, Micah Jones. 11-20 [doi]
- Verified enforcement of stateful information release policiesNikhil Swamy, Michael Hicks. 21-32 [doi]
- A compiler-based infrastructure for software-protectionClifford Liem, Yuan Xiang Gu, Harold Johnson. 33-44 [doi]
- A security domain model to assess software for exploitable covert channelsAlan B. Shaffer, Mikhail Auguston, Cynthia E. Irvine, Timothy E. Levin. 45-56 [doi]
- Static path conditions for JavaChristian Hammer, Rüdiger Schaade, Gregor Snelting. 57-66 [doi]
- Resource bound analysis for database queriesJames Cheney, Morten Dahl. 67-78 [doi]
- Evaluating the cost reduction of static code analysis for software securityDejan Baca, Bengt Carlsson, Lars Lundberg. 79-88 [doi]
- A type system for data-flow integrity on windows vistaAvik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani. 89-100 [doi]
- Dominator-tree analysis for distributed authorizationMiranda Mowbray, Antonio Lain. 101-112 [doi]
- Information flow security of multi-threaded distributed programsRiccardo Focardi, Matteo Centenaro. 113-124 [doi]
- Securing nonintrusive web encryption through information flowLantian Zheng, Andrew C. Myers. 125-134 [doi]
- Lagrange multipliers and maximum information leakage in different observational modelsPasquale Malacaria, Han Chen. 135-146 [doi]