Recognizing safety and liveness, Distributed Computing, vol.56, issue.1???2, pp.117-126, 1987. ,
DOI : 10.1007/BF01782772
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.5470
Verifying temporal properties without temporal logic, ACM Transactions on Programming Languages and Systems, vol.11, issue.1, pp.147-167, 1989. ,
DOI : 10.1145/59287.62028
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.5721
Mobile Resource Guarantees for Smart Devices, Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, International Workshop (CASSIS'04) Barthe, L. Burdy, M. Huisman, J.-L, 2005. ,
DOI : 10.1007/978-3-540-30569-9_1
Composing security policies with Polymer, ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI'05), pp.305-314, 2005. ,
DOI : 10.1145/1065010.1065047
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.70.498
Matching in security-by-contract for mobile code, The Journal of Logic and Algebraic Programming, vol.78, issue.5, pp.340-358, 2009. ,
DOI : 10.1016/j.jlap.2009.02.013
Do You Really Mean What You Actually Enforced?, Lecture Notes in Computer Science, vol.5491, pp.287-301, 2008. ,
DOI : 10.1007/978-3-642-01465-9_19
URL : http://eprints.biblio.unitn.it/1449/1/techRep033.pdf
Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software, 4th International Conference on Information Security Practice and Experience (ISPEC'08), pp.233-247, 2008. ,
DOI : 10.1007/978-3-540-79104-1_17
Enforcing trace properties by program transformation, Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '00, pp.54-66 ,
DOI : 10.1145/325694.325703
URL : https://hal.archives-ouvertes.fr/inria-00000937
TaintDroid, 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI'10) USENIX Association. 10. Erlingsson, ´ U., and Schneider, F. B. IRM enforcement of Java stack inspection IEEE Symposium on Security and Privacy (S&P'00), pp.246-255, 2000. ,
DOI : 10.1145/2619091
Access control by tracking shallow execution history, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.43-55, 2004. ,
DOI : 10.1109/SECPRI.2004.1301314
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.129.1172
Compositional verification of sequential programs with procedures, Information and Computation, vol.206, issue.7, pp.840-868, 2008. ,
DOI : 10.1016/j.ic.2008.03.003
A Formal Connection between Security Automata and JML Annotations, 12th International Conference on Fundamental Approaches to Software Engineering (FASE'09), pp.340-354, 2009. ,
DOI : 10.1007/978-3-642-00593-0_23
Verification of control flow based security properties, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), pp.89-103, 1999. ,
DOI : 10.1109/SECPRI.1999.766902
Verified lightweight bytecode verification, Concurrency and Computation: Practice and Experience, vol.1690, issue.13, pp.1133-1151, 2001. ,
DOI : 10.1002/cpe.597
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.152.7227
Edit automata: enforcement mechanisms for run-time security policies, International Journal of Information Security, vol.3, issue.1-2, pp.1-2, 2005. ,
DOI : 10.1007/s10207-004-0046-8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.114.6074
Enforcing Non-safety Security Policies with Program Monitors, 10th European Symposium on Research in Computer Security (ESORICS'05), pp.355-373, 2005. ,
DOI : 10.1007/11555827_21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.7862
Simulating midlet's security claims with automata modulo theory In Workshop on Programming Languages and Analysis for Security (PLAS'08), pp.1-9, 2008. ,
A security flow control algorithm and its denotational semantics correctness proof, Formal Aspects of Computing, vol.69, issue.2, pp.6-727, 1992. ,
DOI : 10.1007/BF03180570
From system F to typed assembly language, ACM Transactions on Programming Languages and Systems, vol.21, issue.3, pp.527-568, 1999. ,
DOI : 10.1145/319301.319345
JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.228-241, 1999. ,
DOI : 10.1145/292540.292561
Proof-carrying code, Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '97, pp.106-119, 1997. ,
DOI : 10.1145/263699.263712
Semantically rich applicationcentric security in Android, 25th Annual Computer Security Applications Conference (ACSAC'09), pp.340-349, 2009. ,
A systematic approach to static access control, ACM Transactions on Programming Languages and Systems, vol.27, issue.2, pp.344-382, 2005. ,
DOI : 10.1145/1057387.1057392
Lightweight Bytecode Verification, Journal of Automated Reasoning, vol.31, issue.3/4, pp.3-4, 2003. ,
DOI : 10.1023/B:JARS.0000021015.15794.82
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.647
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
DOI : 10.1145/353323.353382
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.1853
Model-carrying code: a practical approach for safe execution of untrusted applications, 19th ACM Symposium on Operating Systems Principles (SOSP'03), pp.15-28, 2003. ,
Execution monitoring enforcement for limited-memory systems, Proceedings of the 2006 International Conference on Privacy, Security and Trust Bridge the Gap Between PST Technologies and Business Services, PST '06, pp.1-3812, 2006. ,
DOI : 10.1145/1501434.1501480
Supporting Security Monitor-Aware Development, Third International Workshop on Software Engineering for Secure Systems (SESS'07: ICSE Workshops 2007), pp.2-6, 2007. ,
DOI : 10.1109/SESS.2007.8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.520.4098
A type system for expressive security policies, Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '00, pp.254-267 ,
DOI : 10.1145/325694.325728
On the Automated Synthesis of Proof-Carrying Temporal Reference Monitors, 16th International Symposium on Logic-Based Program Synthesis and Transformation (LOPSTR'06), pp.111-126, 2006. ,
DOI : 10.1007/978-3-540-71410-1_9