Author of the publication

CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks.

, , and . ACM Trans. Inf. Syst. Secur., 13 (2): 14:1-14:39 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lagrange's Theorem for Binary Squares., , , and . CoRR, (2017)CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks., , and . ACM Trans. Inf. Syst. Secur., 13 (2): 14:1-14:39 (2010)Natural proofs for structure, data, and separation., , , and . PLDI, page 231-242. ACM, (2013)Automated Reasoning and Natural Proofs for Programs Manipulating Data Structures.. FSTTCS, volume 18 of LIPIcs, page 34-35. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2012)Reachability in Concurrent Uninterpreted Programs., and . FSTTCS, volume 150 of LIPIcs, page 46:1-46:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)The Language Theory of Bounded Context-Switching., , and . LATIN, volume 6034 of Lecture Notes in Computer Science, page 96-107. Springer, (2010)Analyzing temporal role based access control models., , , , , , and . SACMAT, page 177-186. ACM, (2012)Analyzing recursive programs using a fixed-point calculus., , and . PLDI, page 211-222. ACM, (2009)Synthesizing Reactive Programs.. CSL, volume 12 of LIPIcs, page 428-442. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2011)A Robust Class of Context-Sensitive Languages., , and . LICS, page 161-170. IEEE Computer Society, (2007)