skip to main content
research-article

Language vulnerabilities: let's not forget concurrency

Published:27 May 2010Publication History
First page image

References

  1. A. Burns, B.Dobbing, and T. Vardanega. Guide for the use of the Ada Ravenscar Profile in high integrity systems. Technical Report YCS-2003-348, University of York, Department of Computer Science, 2003.Google ScholarGoogle Scholar
  2. A. Burns and A. J. Wellings. Real-Time Systems and Programming Languages. Addison Wesley Longman, 4th edition, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. G.F. Coulouris, J. Dollimore, and T. Kindberg. Distributed Systems, Concepts and Design. AddisonWesley, 4th edition, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. ISO/IEC. Information technology -- programming languages -- guide for the use of the Ada Ravenscar Profile in high integrity systems. Technical Report TR 24718, ISO/IEC, 2005.Google ScholarGoogle Scholar
  5. ISO/IEC. Information technology -- programming languages -- guidelines to avoiding vulnerabilities in language selection and use. Technical Report PDTR 24772 -- draft, ISO/IEC, 2009.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM SIGAda Ada Letters
    ACM SIGAda Ada Letters  Volume 30, Issue 1
    April 2010
    150 pages
    ISSN:1094-3641
    DOI:10.1145/1806546
    Issue’s Table of Contents

    Copyright © 2010 Authors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 27 May 2010

    Check for updates

    Qualifiers

    • research-article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader