Author:
Drossopoulou Sophia,Noble James
Publisher
Springer International Publishing
Reference40 articles.
1. Agten, P., Van Acker, S., Brondsema, Y., Phung, P.H., Desmet, L., Piessens, F.: JSand: complete client-side sandboxing of third-party JavaScript without browser modifications. In: ACSAC (2012)
2. Bauer, L., Ligatti, J., Walker, D.: Composing security policies with Polymer. In: PLDI (2005)
3. Bhargavan, K., Delignat-Lavaud, A., Maffeisp, S.: Language-based defenses against untrusted browser origins. In: USENIX Security (2013)
4. Birgisson, A., Russo, A., Sabelfeld, A.: Capabilities for information flow. In: Programming Languages and Analysis for Security (PLAS) (2011)
5. Dennis, J.B., Van Horn, E.C.: Programming Semantics for Multiprogrammed Computations. Comm. ACM 9(3) (1966)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Concurrent garbage collection in the actor model;Proceedings of the 8th ACM SIGPLAN International Workshop on Programming Based on Actors, Agents, and Decentralized Control;2018-11-05
2. Permission and Authority Revisited towards a formalisation;Proceedings of the 18th Workshop on Formal Techniques for Java-like Programs;2016-07-17
3. Swapsies on the Internet;Proceedings of the 10th ACM Workshop on Programming Languages and Analysis for Security;2015-07-04