Amanote Research

Amanote Research

    RegisterSign In

Exploring and Enforcing Security Guarantees via Program Dependence Graphs

doi 10.1145/2737924.2737957
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2015

Authors
Andrew JohnsonLucas WayeScott MooreStephen Chong
Publisher

ACM Press


Related search

Calculating Dependence: Soviet Security Guarantees and China's Pursuit of Nuclear Weapons

SSRN Electronic Journal
2014English

Publishing Attributed Social Graphs With Formal Privacy Guarantees

2016English

Enforcing Information Security Protection: Risk Propensity and Self-Efficacy Perspectives

2017English

System Dependence Graphs in Sequential Erlang

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2012English

Remediation Graphs for Security Patch Management

2004English

Exploring, Reasoning With and Validating Directed Graphs by Applying Formal Concept Analysis to Conceptual Graphs

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2018English

Use of Attack Graphs in Security Systems

Journal of Computer Networks and Communications
Computer NetworksInformation SystemsCommunications
2014English

Enforcing Policy-Based Security Models for Embedded SoCs Within the Internet of Things

2018English

Exploring Attack Vectors and Security Challenges in SDN

International Journal of Innovative Technology and Exploring Engineering
Mechanics of MaterialsElectronic EngineeringCivilStructural EngineeringElectricalComputer Science
2019English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy