共 50 条
- [31] Viper: A Verification Infrastructure for Permission-Based Reasoning DEPENDABLE SOFTWARE SYSTEMS ENGINEERING, 2017, 50 : 104 - 125
- [32] Permission-Based Programming Languages (NIER Track) 2011 33RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2011, : 828 - 831
- [33] Viper: A Verification Infrastructure for Permission-Based Reasoning VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, VMCAI 2016, 2016, 9583 : 41 - 62
- [34] Hierarchical token based mutual exclusion algorithms 2004 IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID - CCGRID 2004, 2004, : 539 - 546
- [35] Permission-based Malware Detection Mechanisms for Smart Phones 2014 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2014), 2014, : 449 - 452
- [36] The Design and Formalization of Mezzo, a Permission-Based Programming Language ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2016, 38 (04):
- [37] Towards Speedy Permission-Based Debloating for Android Apps PROCEEDINGS OF THE 2024 IEEE/ACM 11TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS, MOBILESOFT 2024, 2024, : 84 - 87
- [38] Model-based design and analysis of permission-based security ICECCS 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2005, : 224 - 233
- [39] Automated analysis of permission-based security using UMLsec FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, PROCEEDINGS, 2008, 4961 : 292 - 295
- [40] PERFORMANCE EVALUATION OF DISTRIBUTED MUTUAL EXCLUSION ALGORITHMS FOR COMPUTER-NETWORKS COMPUTING SYSTEMS, 1990, 5 (02): : 59 - 64