Cited By
View all- Nitta NTakata YSeki HReiter M(2001)An efficient security verification method for programs with stack inspectionProceedings of the 8th ACM conference on Computer and Communications Security10.1145/501983.501994(68-77)Online publication date: 5-Nov-2001
- Nitta NSeki HTakata YSandhu RJaeger T(2001)Security verification of programs with stack inspectionProceedings of the sixth ACM symposium on Access control models and technologies10.1145/373256.373260(31-40)Online publication date: 1-May-2001
- Acharya ARaje M(2000)MAPboxProceedings of the 9th conference on USENIX Security Symposium - Volume 910.5555/1251306.1251307(1-1)Online publication date: 14-Aug-2000
- Show More Cited By