{"title":"Java Program Verification at Nijmegen: Developments and Perspective","authors":"B. Jacobs, E. Poll","doi":"10.1007/978-3-540-37621-7_7","DOIUrl":"https://doi.org/10.1007/978-3-540-37621-7_7","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125577880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing RPC with a Reference Monitor for System Calls","authors":"Yasushi Shinjo, Yoshinori Nakata, K. Itano","doi":"10.1007/978-3-540-37621-7_14","DOIUrl":"https://doi.org/10.1007/978-3-540-37621-7_14","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126752896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Unknown Computer Viruses - A New Approach","authors":"A. Mori","doi":"10.1007/978-3-540-37621-7_12","DOIUrl":"https://doi.org/10.1007/978-3-540-37621-7_12","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121172021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lightweight Wrappers for Interfacing with Binary Code in CCured","authors":"M. Harren, G. Necula","doi":"10.1007/978-3-540-37621-7_11","DOIUrl":"https://doi.org/10.1007/978-3-540-37621-7_11","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124904184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal Specification and Verification of Resource Bound Security Using PVS","authors":"Weijiang Yu, A. Mok","doi":"10.1007/978-3-540-37621-7_6","DOIUrl":"https://doi.org/10.1007/978-3-540-37621-7_6","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124924773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UML Scrapbook and Realization of Snapshot Programming Environment","authors":"O. Sato, R. Potter, M. Yamamoto, M. Hagiya","doi":"10.1007/978-3-540-37621-7_15","DOIUrl":"https://doi.org/10.1007/978-3-540-37621-7_15","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129806835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Policy Descriptions Through the Use of Control Structure of a Target Program","authors":"H. Abe, Kazuhiko Kato","doi":"10.1007/978-3-540-37621-7_13","DOIUrl":"https://doi.org/10.1007/978-3-540-37621-7_13","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127338566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inferences on Honesty in Compositional Logic for Protocol Analysis","authors":"Koji Hasebe, M. Okada","doi":"10.1007/978-3-540-37621-7_4","DOIUrl":"https://doi.org/10.1007/978-3-540-37621-7_4","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127477736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal Analysis of the NetBill Electronic Commerce Protocol","authors":"K. Ogata, K. Futatsugi","doi":"10.1007/978-3-540-37621-7_3","DOIUrl":"https://doi.org/10.1007/978-3-540-37621-7_3","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114615602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack","authors":"Daigo Tomioka, S. Nishizaki, R. Ikeda","doi":"10.1007/978-3-540-37621-7_2","DOIUrl":"https://doi.org/10.1007/978-3-540-37621-7_2","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134037568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}