Search Results - ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security AND Protection/D.4.6.0: Access controls*
-
1
Authors: et al.
Contributors: et al.
Source: PLAS - Seventh Workshop on Programming Languages and Analysis for Security ; https://inria.hal.science/hal-00773654 ; PLAS - Seventh Workshop on Programming Languages and Analysis for Security, Jun 2012, Beijing, China. ⟨10.1145/2336717.2336726⟩
Subject Terms: ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.3: Language Constructs and Features/D.3.3.1: Classes and objects, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.3: Language Constructs and Features/D.3.3.9: Inheritance, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.2: Language Classifications/D.3.2.0: Applicative (functional) languages, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.1: Requirements/Specifications/D.2.1.1: Languages, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.2: Correctness proofs, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.0: Access controls, [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL]
-
2
Authors: et al.
Contributors: et al.
Source: PLAS - Seventh Workshop on Programming Languages and Analysis for Security ; https://inria.hal.science/hal-00773654 ; PLAS - Seventh Workshop on Programming Languages and Analysis for Security, Jun 2012, Beijing, China. ⟨10.1145/2336717.2336726⟩
Subject Terms: ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.3: Language Constructs and Features/D.3.3.1: Classes and objects, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.3: Language Constructs and Features/D.3.3.9: Inheritance, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.2: Language Classifications/D.3.2.0: Applicative (functional) languages, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.1: Requirements/Specifications/D.2.1.1: Languages, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.2: Correctness proofs, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.0: Access controls, [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL]
-
3
Authors: et al.
Contributors: et al.
Source: PLAS - Seventh Workshop on Programming Languages and Analysis for Security ; https://inria.hal.science/hal-00773654 ; PLAS - Seventh Workshop on Programming Languages and Analysis for Security, Jun 2012, Beijing, China. ⟨10.1145/2336717.2336726⟩
Subject Terms: ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.3: Language Constructs and Features/D.3.3.1: Classes and objects, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.3: Language Constructs and Features/D.3.3.9: Inheritance, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.2: Language Classifications/D.3.2.0: Applicative (functional) languages, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.1: Requirements/Specifications/D.2.1.1: Languages, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.2: Correctness proofs, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.0: Access controls, [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL]
Nájsť tento článok vo Web of Science