dblp.uni-trier.dewww.uni-trier.de

Gleb Naumovich

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
22EEAiwu Shi, Gleb Naumovich: Improving Data Integrity with a Java Mutability Analysis. APSEC 2007: 135-142
21EEAiwu Shi, Gleb Naumovich: Field Escape Analysis for Data Confidentiality in Java Components. APSEC 2007: 143-150
20 Aiwu Shi, Gleb Naumovich: SAFES: A Static Analysis for Field Security in Java Components. SEKE 2007: 302-307
2006
19EEPaolina Centonze, Gleb Naumovich, Stephen J. Fink, Marco Pistoia: Role-Based access control consistency validation. ISSTA 2006: 121-132
2005
18EEAiwu Shi, Gleb Naumovich: Static Analysis for Computing Escapability and Mutability for Java Components. SCAM 2005: 119-128
2004
17EEChris Kojouharov, Aleksey Solodovnik, Gleb Naumovich: JTutor: an Eclipse plug-in suite for creation and replay of code-based tutorials. ETX 2004: 27-31
16EEGleb Naumovich, Paolina Centonze: Static analysis of role-based access control in J2EE applications. ACM SIGSOFT Software Engineering Notes 29(5): 1-10 (2004)
15EEMatthew B. Dwyer, Lori A. Clarke, Jamieson M. Cobleigh, Gleb Naumovich: Flow analysis for verifying properties of concurrent software systems. ACM Trans. Softw. Eng. Methodol. 13(4): 359-430 (2004)
2003
14EEMikhail Sosonkin, Gleb Naumovich, Nasir D. Memon: Obfuscation of design intent in object-oriented applications. Digital Rights Management Workshop 2003: 142-153
13 Vikram Anantapadmanabhan, Phyllis G. Frankl, Nasir D. Memon, Gleb Naumovich: Design of a Laboratory for Information Security Education. World Conference on Information Security Education 2003: 61-73
12EEGleb Naumovich, Nasir D. Memon: Preventing Piracy, Reverse Engineering, and Tampering. IEEE Computer 36(7): 64-71 (2003)
2002
11EEGleb Naumovich: A conservative algorithm for computing the flow of permissions in Java programs. ISSTA 2002: 33-43
10EEGleb Naumovich: Using the observer design pattern for implementation of data flow analyses. PASTE 2002: 61-68
2000
9EEGleb Naumovich, Lori A. Clarke: Classifying properties: an alternative to the safety-liveness classification. SIGSOFT FSE 2000: 159-168
1999
8EEGleb Naumovich, George S. Avrunin, Lori A. Clarke: An Efficient Algorithm for Computing MHP Information for Concurrent Java Programs. ESEC / SIGSOFT FSE 1999: 338-354
7EEGleb Naumovich, George S. Avrunin, Lori A. Clarke: Data Flow Analysis for Checking Properties of Concurrent Java Programs. ICSE 1999: 399-410
6EEGleb Naumovich, Lori A. Clarke, Jamieson M. Cobleigh: Using Partial Order Techniques to Improve Performance of Data Flow Analysis Based Verification. PASTE 1999: 57-65
1998
5EEGleb Naumovich, Lori A. Clarke, Leon J. Osterweil: Efficient Composite Data Flow Analysis Applied to Concurrent Programs. PASTE 1998: 51-58
4EEGleb Naumovich, George S. Avrunin: A Conservative Data Flow Algorithm for Detecting All Pairs of Statement That May Happen in Parallel. SIGSOFT FSE 1998: 24-34
1997
3EEGleb Naumovich, George S. Avrunin, Lori A. Clarke, Leon J. Osterweil: Applying Static Analysis to Software Architectures. ESEC / SIGSOFT FSE 1997: 77-93
2EEGleb Naumovich, Lori A. Clarke, Leon J. Osterweil, Matthew B. Dwyer: Verification of Concurrent Software with FLAVERS. ICSE 1997: 594-595
1996
1EEGleb Naumovich, Lori A. Clarke, Leon J. Osterweil: Verification of Communication Protocols Using Data Flow Analysis. SIGSOFT FSE 1996: 93-105

Coauthor Index

1Vikram Anantapadmanabhan [13]
2George S. Avrunin [3] [4] [7] [8]
3Paolina Centonze [16] [19]
4Lori A. Clarke [1] [2] [3] [5] [6] [7] [8] [9] [15]
5Jamieson M. Cobleigh [6] [15]
6Matthew B. Dwyer [2] [15]
7Stephen J. Fink (Stephen Fink) [19]
8Phyllis G. Frankl [13]
9Chris Kojouharov [17]
10Nasir D. Memon [12] [13] [14]
11Leon J. Osterweil [1] [2] [3] [5]
12Marco Pistoia [19]
13Aiwu Shi [18] [20] [21] [22]
14Aleksey Solodovnik [17]
15Mikhail Sosonkin [14]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)