{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:18:39Z","timestamp":1730315919629,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,6,15]]},"DOI":"10.1145\/2336717.2336720","type":"proceedings-article","created":{"date-parts":[[2012,7,26]],"date-time":"2012-07-26T10:41:14Z","timestamp":1343299274000},"page":"1-11","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Security-policy monitoring and enforcement with JavaMOP"],"prefix":"10.1145","author":[{"given":"Soha","family":"Hussein","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Patrick","family":"Meredith","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Grigore","family":"Ro\u015flu","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]}],"member":"320","published-online":{"date-parts":[[2012,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"USA","author":"Alpern B.","year":"1984","unstructured":"B. Alpern and F. B. Schneider . Defining Liveness. Technical report, Ithaca, NY , USA , 1984 . B. Alpern and F. B. Schneider. Defining Liveness. Technical report, Ithaca, NY, USA, 1984."},{"key":"e_1_3_2_1_2_1","volume-title":"NGSSoftware Insight Security Research","author":"Anley C.","year":"2002","unstructured":"C. Anley . Advanced SQL Injection in SQL Server Applications . NGSSoftware Insight Security Research , 2002 . C. Anley. Advanced SQL Injection in SQL Server Applications. NGSSoftware Insight Security Research, 2002."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297070"},{"key":"e_1_3_2_1_4_1","volume-title":"Runtime Verification (RV'05)","author":"Barringer H.","year":"2005","unstructured":"H. Barringer , B. Finkbeiner , Y. Gurevich , and H. Sipma . Runtime Verification (RV'05) . Elsevier , 2005 . ENTCS 144. H. Barringer, B. Finkbeiner, Y. Gurevich, and H. Sipma. Runtime Verification (RV'05). Elsevier, 2005. ENTCS 144."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exn076"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065047"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"},{"key":"e_1_3_2_1_9_1","volume-title":"a tool for runtime-checking temporal assertions. Master's thesis","author":"Bodden E.","year":"2005","unstructured":"E. Bodden . J-LO , a tool for runtime-checking temporal assertions. Master's thesis , RWTH Aachen University , 2005 . E. Bodden. J-LO, a tool for runtime-checking temporal assertions. Master's thesis, RWTH Aachen University, 2005."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"e_1_3_2_1_11_1","first-page":"18","volume-title":"The Ponder Policy Specification Language. In Workshop on Policies for Distributed Systems and Networks (POLICY'01)","author":"Damianou N.","year":"2001","unstructured":"N. Damianou , N. Dulay , E. Lupu , and M. Sloman . The Ponder Policy Specification Language. In Workshop on Policies for Distributed Systems and Networks (POLICY'01) , pages 18 -- 38 . Springer , 2001 . N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder Policy Specification Language. In Workshop on Policies for Distributed Systems and Networks (POLICY'01), pages 18--38. Springer, 2001."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083249"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1137627.1137633"},{"key":"e_1_3_2_1_15_1","first-page":"246","volume-title":"IRM Enforcement of Java Stack Inspection. In IEEE Symposium on Security and Privacy (SOSP'00)","author":"Erlingsson U.","year":"2000","unstructured":"U. Erlingsson and F. B. Schneider . IRM Enforcement of Java Stack Inspection. In IEEE Symposium on Security and Privacy (SOSP'00) , pages 246 -- 255 . IEEE, 2000 . U. Erlingsson and F. B. Schneider. IRM Enforcement of Java Stack Inspection. In IEEE Symposium on Security and Privacy (SOSP'00), pages 246--255. IEEE, 2000."},{"key":"e_1_3_2_1_16_1","first-page":"87","volume":"3","author":"Erlingsson U.","year":"2000","unstructured":"U. Erlingsson and F. B. Schneider . SASI Enforcement of Security Policies: A Retrospective. ACM Transactions on Information and System Security , 3 : 87 -- 95 , 2000 . U. Erlingsson and F. B. Schneider. SASI Enforcement of Security Policies: A Retrospective. ACM Transactions on Information and System Security, 3:87--95, 2000.","journal-title":"SASI Enforcement of Security Policies: A Retrospective. ACM Transactions on Information and System Security"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010241"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094841"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375696.1375699"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111596.1111601"},{"key":"e_1_3_2_1_22_1","volume-title":"RV'02, RV'04)","author":"Havelund K.","year":"2001","unstructured":"K. Havelund and G. Ro\u015fu . Runtime Verification (RV'01 , RV'02, RV'04) . Elsevier , 2001 , 2002, 2004. ENTCS 55, 70, 113. K. Havelund and G. Ro\u015fu. Runtime Verification (RV'01, RV'02, RV'04). Elsevier, 2001, 2002, 2004. ENTCS 55, 70, 113."},{"key":"e_1_3_2_1_23_1","first-page":"327","volume-title":"An Overview of AspectJ. In European Conference on Object Oriented Programming (ECOOP'01)","volume":"2072","author":"Kiczales G.","year":"2001","unstructured":"G. Kiczales , E. Hilsdale , J. Hugunin , M. Kersten , J. Palm , and W. G. Griswold . An Overview of AspectJ. In European Conference on Object Oriented Programming (ECOOP'01) , volume 2072 of LNCS, pages 327 -- 353 . Springer , 2001 . G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W. G. Griswold. An Overview of AspectJ. In European Conference on Object Oriented Programming (ECOOP'01), volume 2072 of LNCS, pages 327--353. Springer, 2001."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0046-8"},{"key":"e_1_3_2_1_25_1","volume-title":"Princeton University","author":"Ligatti J. A.","year":"2006","unstructured":"J. A. Ligatti . Policy Enforcement via Program Monitoring. PhD thesis , Princeton University , 2006 . J. A. Ligatti. Policy Enforcement via Program Monitoring. PhD thesis, Princeton University, 2006."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094840"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/3115971.3116164"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.149"},{"key":"e_1_3_2_1_29_1","first-page":"1278","volume":"63","author":"Saltzer J.","year":"1975","unstructured":"J. Saltzer and M. Schroeder . The Protection of Information in Computer Systems. Proceedings of the IEEE , 63 : 1278 -- 1308 , 1975 . J. Saltzer and M. Schroeder. The Protection of Information in Computer Systems. Proceedings of the IEEE, 63:1278--1308, 1975.","journal-title":"The Protection of Information in Computer Systems. Proceedings of the IEEE"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"e_1_3_2_1_31_1","volume-title":"Runtime Verification (RV'03)","author":"Sokolsky O.","year":"2003","unstructured":"O. Sokolsky and M. Viswanathan . Runtime Verification (RV'03) . Elsevier , 2003 . ENTCS 89. O. Sokolsky and M. Viswanathan. Runtime Verification (RV'03). Elsevier, 2003. ENTCS 89."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.02.007"},{"key":"e_1_3_2_1_33_1","first-page":"1","volume-title":"AOSD Security: A Practical Assessment. In Workshop on Software engineering Properties of Languages for Aspect Technologies (SPLAT03","author":"Win B. D.","year":"2003","unstructured":"B. D. Win , W. Joosen , and F. Piessens . AOSD Security: A Practical Assessment. In Workshop on Software engineering Properties of Languages for Aspect Technologies (SPLAT03 , pages 1 -- 6 , 2003 . B. D. Win, W. Joosen, and F. Piessens. AOSD Security: A Practical Assessment. In Workshop on Software engineering Properties of Languages for Aspect Technologies (SPLAT03, pages 1--6, 2003."}],"event":{"name":"PLDI '12: ACM SIGPLAN Conference on Programming Language Design and Implementation","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Beijing China","acronym":"PLDI '12"},"container-title":["Proceedings of the 7th Workshop on Programming Languages and Analysis for Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2336717.2336720","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T17:30:54Z","timestamp":1673285454000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2336717.2336720"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,15]]},"references-count":30,"alternative-id":["10.1145\/2336717.2336720","10.1145\/2336717"],"URL":"https:\/\/doi.org\/10.1145\/2336717.2336720","relation":{},"subject":[],"published":{"date-parts":[[2012,6,15]]},"assertion":[{"value":"2012-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}