Decidability of the Security Verification Problem for Programs with Stack Inspection
スポンサーリンク
概要
- 論文の詳細を見る
- 社団法人電子情報通信学会の論文
- 2002-04-01
著者
-
SEKI Hiroyuki
Nara Institute of Science and Technology
-
Seki Hiroyuki
Nara Inst. Sci. And Technol. Ikoma‐shi Jpn
-
Seki Hiroyuki
Graduate School Of Information Science Nara Institute Of Science And Technology
-
Takata Yoshiaki
Kochi Univ. Technol. Kami‐shi Jpn
-
Takata Yoshiaki
Graduate School Of Information Science Nara Institute Of Science And Technology
-
NITTA Naoya
Graduate School of Information Science, Nara Institute of Science and Technology
-
Nitta Naoya
Nara Inst. Sci. And Technol. Ikoma‐shi Jpn
-
Nitta Naoya
Graduate School Of Information Science Nara Institute Of Science And Technology
関連論文
- A Formal Approach to Detecting Security Flaws in Object-Oriented Databases (Special Issue on New Generation Database Technologies)
- An Authorization Model for Object-Oriented Databases and Its Efficient Access Control
- Assignment of Data Types to Words in a Natural Language Specification
- Implementation of Natural Language Specifications of Communication Protocols by Executable Specifications
- RNA Pseudoknotted Structure Prediction Using Stochastic Multiple Context-Free Grammar
- RIGHT-LINEAR FINITE PATH OVERLAPPING REWRITE SYSTEMS EFFECTIVELY PRESERVE RECOGNIZABILITY
- A Polynomial Time Learning Algorithm for Recognizable Series
- Layered Transducing Term Rewriting System and Its Recognizability Preserving Property (Special Issue on Selected Papers from LA Symposium)
- Termination Property of Inverse Finite Path Overlapping Term Rewriting System is Decidable
- A Polynomial-Time Recognizable Subclass of Lexical-Functional Grammars
- A Note on Inadequacy of the Model for Learning from Queries
- Finite State Translation Systems and Parallel Multiple Context-Free Grammars
- A Labeled Transition Model A-LTS for History-Based Aspect Weaving and Its Expressive Power
- New certificate chain discovery methods for trust establishment in ad hoc networks and their evaluation (特集:次世代社会基盤をもたらす高度交通システムとモバイル通信システム)
- Policy Controlled System and Its Model Checking
- Decidability of the Security Verification Problem for Programs with Stack Inspection
- Formal Language Theoretic Approach to the Disclosure Tree Strategy in Trust Negotiation
- Comparison of the Expressive Power of Language-Based Access Control Models
- FOREWORD
- Tree Automaton with Tree Memory
- Static Analysis for k-secrecy against Inference Attacks
- An Efficient Method for Optimal Probe Deployment of Distributed IDS(Dependable Computing)
- An extension of object oriented programming for structural changes in system design (特集 情報システム設計論)
- Error Control for High-density Monochrome Two-dimensional Barcodes
- RNA Pseudoknotted Structure Prediction Using Stochastic Multiple Context-Free Grammar
- A Weighted-Pushdown-System-Based Formal Model for Information-Based Access Control
- Deciding Schema k-Secrecy for XML Databases
- LTL Model Checking for Extended Pushdown Systems with Regular Tree Valuations
- A Static Analysis using Tree Automata for XML Access Control
- New Certificate Chain Discovery Methods for Trust Establishment in Ad Hoc Networks and Their Evaluation
- New Certificate Chain Discovery Methods for Trust Establishment in Ad Hoc Networks and Their Evaluation
- Runtime Control of a Program based on Quantitative Information Flow