International Symposium on Systems Synthesis最新文献

筛选
英文 中文
Java Program Verification at Nijmegen: Developments and Perspective Java程序验证在奈梅亨:发展和前景
International Symposium on Systems Synthesis Pub Date : 2003-11-04 DOI: 10.1007/978-3-540-37621-7_7
B. Jacobs, E. Poll
{"title":"Java Program Verification at Nijmegen: Developments and Perspective","authors":"B. Jacobs, E. Poll","doi":"10.1007/978-3-540-37621-7_7","DOIUrl":"https://doi.org/10.1007/978-3-540-37621-7_7","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125577880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 94
Securing RPC with a Reference Monitor for System Calls 使用系统调用的参考监视器保护RPC
International Symposium on Systems Synthesis Pub Date : 2003-11-04 DOI: 10.1007/978-3-540-37621-7_14
Yasushi Shinjo, Yoshinori Nakata, K. Itano
{"title":"Securing RPC with a Reference Monitor for System Calls","authors":"Yasushi Shinjo, Yoshinori Nakata, K. Itano","doi":"10.1007/978-3-540-37621-7_14","DOIUrl":"https://doi.org/10.1007/978-3-540-37621-7_14","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126752896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting Unknown Computer Viruses - A New Approach 检测未知计算机病毒-一种新方法
International Symposium on Systems Synthesis Pub Date : 2003-11-04 DOI: 10.1007/978-3-540-37621-7_12
A. Mori
{"title":"Detecting Unknown Computer Viruses - A New Approach","authors":"A. Mori","doi":"10.1007/978-3-540-37621-7_12","DOIUrl":"https://doi.org/10.1007/978-3-540-37621-7_12","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121172021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Lightweight Wrappers for Interfacing with Binary Code in CCured ccure中与二进制代码接口的轻量级包装器
International Symposium on Systems Synthesis Pub Date : 2003-11-04 DOI: 10.1007/978-3-540-37621-7_11
M. Harren, G. Necula
{"title":"Lightweight Wrappers for Interfacing with Binary Code in CCured","authors":"M. Harren, G. Necula","doi":"10.1007/978-3-540-37621-7_11","DOIUrl":"https://doi.org/10.1007/978-3-540-37621-7_11","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124904184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Formal Specification and Verification of Resource Bound Security Using PVS 使用PVS的资源绑定安全性形式化规范与验证
International Symposium on Systems Synthesis Pub Date : 2003-11-04 DOI: 10.1007/978-3-540-37621-7_6
Weijiang Yu, A. Mok
{"title":"Formal Specification and Verification of Resource Bound Security Using PVS","authors":"Weijiang Yu, A. Mok","doi":"10.1007/978-3-540-37621-7_6","DOIUrl":"https://doi.org/10.1007/978-3-540-37621-7_6","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124924773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
UML Scrapbook and Realization of Snapshot Programming Environment UML剪贴簿及快照编程环境的实现
International Symposium on Systems Synthesis Pub Date : 2003-11-04 DOI: 10.1007/978-3-540-37621-7_15
O. Sato, R. Potter, M. Yamamoto, M. Hagiya
{"title":"UML Scrapbook and Realization of Snapshot Programming Environment","authors":"O. Sato, R. Potter, M. Yamamoto, M. Hagiya","doi":"10.1007/978-3-540-37621-7_15","DOIUrl":"https://doi.org/10.1007/978-3-540-37621-7_15","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129806835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Security Policy Descriptions Through the Use of Control Structure of a Target Program 通过使用目标程序的控制结构来描述安全策略
International Symposium on Systems Synthesis Pub Date : 2003-11-04 DOI: 10.1007/978-3-540-37621-7_13
H. Abe, Kazuhiko Kato
{"title":"Security Policy Descriptions Through the Use of Control Structure of a Target Program","authors":"H. Abe, Kazuhiko Kato","doi":"10.1007/978-3-540-37621-7_13","DOIUrl":"https://doi.org/10.1007/978-3-540-37621-7_13","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127338566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inferences on Honesty in Compositional Logic for Protocol Analysis 协议分析组合逻辑中诚实性的推论
International Symposium on Systems Synthesis Pub Date : 2003-11-04 DOI: 10.1007/978-3-540-37621-7_4
Koji Hasebe, M. Okada
{"title":"Inferences on Honesty in Compositional Logic for Protocol Analysis","authors":"Koji Hasebe, M. Okada","doi":"10.1007/978-3-540-37621-7_4","DOIUrl":"https://doi.org/10.1007/978-3-540-37621-7_4","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127477736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Formal Analysis of the NetBill Electronic Commerce Protocol NetBill电子商务协议的形式化分析
International Symposium on Systems Synthesis Pub Date : 2003-11-04 DOI: 10.1007/978-3-540-37621-7_3
K. Ogata, K. Futatsugi
{"title":"Formal Analysis of the NetBill Electronic Commerce Protocol","authors":"K. Ogata, K. Futatsugi","doi":"10.1007/978-3-540-37621-7_3","DOIUrl":"https://doi.org/10.1007/978-3-540-37621-7_3","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114615602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack 一种抗拒绝服务攻击的成本估算方法
International Symposium on Systems Synthesis Pub Date : 2003-11-04 DOI: 10.1007/978-3-540-37621-7_2
Daigo Tomioka, S. Nishizaki, R. Ikeda
{"title":"A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack","authors":"Daigo Tomioka, S. Nishizaki, R. Ikeda","doi":"10.1007/978-3-540-37621-7_2","DOIUrl":"https://doi.org/10.1007/978-3-540-37621-7_2","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134037568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信