Search for persons
X
?
Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy ,
1
Patching Logic Vulnerabilities for Web Applications using L..:
, In:
?
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security ,
2
MACE : Detecting Privilege Escalation Vulnerabilities in..:
, In:
?
Proceedings of the Eighth ACM SIGPLAN workshop on Programming languages and analysis for security ,
3
Session details: Keynote address:
, In:
?
Proceedings of the 4th ACM workshop on Security and artificial intelligence ,
5
ZDVUE : prioritization of javascript attacks to discover..:
, In:
?
Proceedings of the 16th ACM symposium on Access control models and technologies ,
6
SEAL : a logic programming framework for specifying and ..:
, In:
?
Proceedings of the 15th ACM conference on Computer and communications security ,
9
EON : modeling and analyzing dynamic access control syst..:
, In:
?
Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security ,
10
A type system for data-flow integrity on windows vista:
, In:
?
Proceedings of the fourth ACM workshop on Formal methods in security ,
11
NETRA: : seeing through access control:
, In:
?
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security ,
12
Modeling insecurity : policy engineering for survivabili..:
, In:
?
Proceedings of the eighth ACM symposium on Access control models and technologies ,
13
Dynamic access control : preserving safety and trust for..:
, In:
?
Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing ,
14