-
1
-
-
0032681509
-
A core calculus of dependency
-
ACM, ed., San Antonio, TX, ACM Press, New York, NY, USA
-
M. Abadi, A. Banerjee, N. Heintze and J.G. Riecke, A core calculus of dependency, in: POPL '99, Proceedings of the 26th ACM SIGPLAN-SIGACT on Principles of programming languages, 1999, ACM, ed., San Antonio, TX, ACM Press, New York, NY, USA, 1999, pp. 147-160.
-
(1999)
POPL '99, Proceedings of the 26th ACM SIGPLAN-SIGACT on Principles of Programming Languages, 1999
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.G.4
-
2
-
-
84982909952
-
Secure implementation of channel abstractions
-
Indiana, IEEE, Computer Society Press
-
M. Abadi, C. Fournet and G. Gonthier, Secure implementation of channel abstractions, in: LICS 98, (Indiana), IEEE, Computer Society Press, 1998, pp. 105-116.
-
(1998)
LICS 98
, pp. 105-116
-
-
Abadi, M.1
Fournet, C.2
Gonthier, G.3
-
3
-
-
84955577422
-
On bisimulations for the asynchronous π-calculus
-
Proceedings CONCUR 96, U. Montanari and V. Sassone, eds, Pisa, Italy
-
R.M. Amadio, I. Castellani and D. Sangiorgi, On bisimulations for the asynchronous π-calculus, in: Proceedings CONCUR 96, U. Montanari and V. Sassone, eds, Pisa, Italy, Vol. 1119 of LNCS, 1996, pp. 147-162.
-
(1996)
LNCS
, vol.1119
, pp. 147-162
-
-
Amadio, R.M.1
Castellani, I.2
Sangiorgi, D.3
-
4
-
-
0004058383
-
-
Technical Report UUCS-98-015, University of Utah, Department of Computer Science, Aug. 6
-
G. Back, P. Tullmann, L. Stoller, W.C. Hsieh and J. Lepreau, Java operating systems: Design and implementation, Technical Report UUCS-98-015, University of Utah, Department of Computer Science, Aug. 6, 1998.
-
(1998)
Java Operating Systems: Design and Implementation
-
-
Back, G.1
Tullmann, P.2
Stoller, L.3
Hsieh, W.C.4
Lepreau, J.5
-
5
-
-
84947766872
-
A fully abstract semantics for causality in the pi-calculus
-
Proceedings of STACS '95, E.W. Mayr and C. Puech, eds, Springer-Verlag
-
M. Boreale and D. Sangiorgi, A fully abstract semantics for causality in the pi-calculus, in: Proceedings of STACS '95, Vol. 900 of Lecture Notes in Computer Science, E.W. Mayr and C. Puech, eds, Springer-Verlag, 1995, pp. 243-254.
-
(1995)
Lecture Notes in Computer Science
, vol.900
, pp. 243-254
-
-
Boreale, M.1
Sangiorgi, D.2
-
7
-
-
0021465083
-
A theory of communicating sequential processes
-
S. Brookes, C. Hoare and A. Roscoe, A theory of communicating sequential processes, Journal of the ACM 31(3) (1984), 560-599.
-
(1984)
Journal of the ACM
, vol.31
, Issue.3
, pp. 560-599
-
-
Brookes, S.1
Hoare, C.2
Roscoe, A.3
-
8
-
-
84947919695
-
Mobile ambients
-
Proc. of Foundations of Software Science and Computation Structures (FoSSaCS), ETAPS '98
-
L. Cardelli and A.D. Gordon, Mobile ambients, in: Proc. of Foundations of Software Science and Computation Structures (FoSSaCS), ETAPS '98, LNCS 1378, 1998, pp. 140-155.
-
(1998)
LNCS
, vol.1378
, pp. 140-155
-
-
Cardelli, L.1
Gordon, A.D.2
-
9
-
-
84958053073
-
Causality for mobile processes
-
Proceedings of ICALP '95, Z. Fülöp and F. Gécseg, eds, Springer-Verlag
-
P. Degano and C. Priami, Causality for mobile processes, in: Proceedings of ICALP '95, Vol. 944 of Lecture Notes in Computer Science, Z. Fülöp and F. Gécseg, eds, Springer-Verlag, 1995, pp. 660-671.
-
(1995)
Lecture Notes in Computer Science
, vol.944
, pp. 660-671
-
-
Degano, P.1
Priami, C.2
-
10
-
-
85086058271
-
Microkernels meet recursive virtual machines
-
USENIX, ed., Seattle, WA, Berkeley, CA, USA, USENIX
-
B. Ford, M. Hibler, J. Lepreau, P. Tullman, G. Back and S. Clawson, Microkernels meet recursive virtual machines, in: 2nd Symposium on Operating Systems Design and Implementation (OSDI '96), USENIX, ed., Seattle, WA, Berkeley, CA, USA, USENIX, 1996, pp. 137-151.
-
(1996)
2nd Symposium on Operating Systems Design and Implementation (OSDI '96)
, pp. 137-151
-
-
Ford, B.1
Hibler, M.2
Lepreau, J.3
Tullman, P.4
Back, G.5
Clawson, S.6
-
11
-
-
84955565479
-
A calculus of mobile agents
-
Proceedings of CONCUR '96, Springer-Verlag
-
C. Fournet, G. Gonthier, J.-J. Lévy, L. Maranget and D. Rémy, A calculus of mobile agents, in: Proceedings of CONCUR '96. LNCS 1119, Springer-Verlag, 1996, pp. 406-421.
-
(1996)
LNCS
, vol.1119
, pp. 406-421
-
-
Fournet, C.1
Gonthier, G.2
Lévy, J.-J.3
Maranget, L.4
Rémy, D.5
-
12
-
-
84940106242
-
Hardening COTS software with generic software wrappers
-
Berkeley, California
-
T. Fraser, L. Badger and M. Feldman, Hardening COTS software with generic software wrappers, in: IEEE Symposium on Security and Privacy, Berkeley, California, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
-
-
Fraser, T.1
Badger, L.2
Feldman, M.3
-
13
-
-
0013080960
-
-
Technical Report CSD-96-920, University of California, Berkeley, Apr. 9
-
D.P. Ghormley, S.H. Rodrigues, D. Petrou and T.E. Anderson, Interposition as an operating system extension mechanism, Technical Report CSD-96-920, University of California, Berkeley, Apr. 9, 1997.
-
(1997)
Interposition as an Operating System Extension Mechanism
-
-
Ghormley, D.P.1
Rodrigues, S.H.2
Petrou, D.3
Anderson, T.E.4
-
14
-
-
0032660980
-
Type-safe linking and modular assembly language
-
ACM, ed., San Antonio, TX, New York, NY, USA, ACM Press
-
N. Glew and G. Morrisett, Type-safe linking and modular assembly language, in: POPL '99. Proceedings of the 26th ACM SIGPLAN-SIGACT on Principles of programming languages, 1999, ACM, ed., San Antonio, TX, New York, NY, USA, ACM Press, 1999, pp. 250-261.
-
(1999)
POPL '99. Proceedings of the 26th ACM SIGPLAN-SIGACT on Principles of Programming Languages, 1999
, pp. 250-261
-
-
Glew, N.1
Morrisett, G.2
-
15
-
-
85084162735
-
A secure environment for untrusted helper applications
-
San Jose, California
-
I. Goldberg, D. Wagner, R. Thomas and E.A. Brewer, A secure environment for untrusted helper applications, in: Sixth USENIX Security Symposium, San Jose, California, 1996.
-
(1996)
Sixth USENIX Security Symposium
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
18
-
-
84974577536
-
Information flow vs resource access in the asynchronous pi-calculus (extended abstract)
-
Proceedings of the 27th ICALP
-
M. Hennessy and J. Riely, Information flow vs resource access in the asynchronous pi-calculus (extended abstract), in: Proceedings of the 27th ICALP, LNCS 1853, 2000, pp. 415-427.
-
(2000)
LNCS
, vol.1853
, pp. 415-427
-
-
Hennessy, M.1
Riely, J.2
-
19
-
-
84983016110
-
An object calculus for asynchronous communication
-
Proceedings of ECOOP '91, P. America, ed.
-
K. Honda and M. Tokoro, An object calculus for asynchronous communication, in: Proceedings of ECOOP '91, LNCS 512, P. America, ed., 1991, pp. 133-147.
-
(1991)
LNCS
, vol.512
, pp. 133-147
-
-
Honda, K.1
Tokoro, M.2
-
21
-
-
0031234163
-
A flexible security system for using Internet content
-
N. Islam, R. Anand, T. Jaeger and J.R. Rao, A flexible security system for using Internet content, IEEE Software 14(5) (1997), 52-59.
-
(1997)
IEEE Software
, vol.14
, Issue.5
, pp. 52-59
-
-
Islam, N.1
Anand, R.2
Jaeger, T.3
Rao, J.R.4
-
22
-
-
0013168725
-
Interposition agents: Transparently interposing user code at the system interface
-
J. Vitek and C. Jensen, eds, Springer-Verlag
-
M.B. Jones, Interposition agents: Transparently interposing user code at the system interface, in: Secure Internet Programing: Security Issues for Mobile and Distributed Objects, J. Vitek and C. Jensen, eds, Springer-Verlag, 1999.
-
(1999)
Secure Internet Programing: Security Issues for Mobile and Distributed Objects
-
-
Jones, M.B.1
-
23
-
-
0000446356
-
A network pump
-
M.H. Kang, I.S. Moskowitz and D.C. Lee, A network pump, IEEE Transactions on Software Engineering 22(5) (1996), 329-338.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.5
, pp. 329-338
-
-
Kang, M.H.1
Moskowitz, I.S.2
Lee, D.C.3
-
24
-
-
0031650932
-
Security properties of typed applets
-
San Diego, California
-
X. Leroy and F. Rouaix, Security properties of typed applets, in: Conference Record of POPL '98: The 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Diego, California, 1998, pp. 391-403.
-
(1998)
Conference Record of POPL '98: The 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 391-403
-
-
Leroy, X.1
Rouaix, F.2
-
26
-
-
44049113210
-
A calculus of mobile processes, Parts I + II
-
R. Milner, J. Parrow and D. Walker, A calculus of mobile processes, Parts I + II, Information and Computation 100(1) (1992), 1-77.
-
(1992)
Information and Computation
, vol.100
, Issue.1
, pp. 1-77
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
27
-
-
0001800257
-
Safe, untrusted agents using proof-carrying code
-
Mobile Agents and Security, G. Vigna, ed., SV
-
G.C. Necula and P. Lee, Safe, untrusted agents using proof-carrying code, in: Mobile Agents and Security, Vol. 1419 of LNCS, G. Vigna, ed., SV, 1998, pp. 61-91.
-
(1998)
LNCS
, vol.1419
, pp. 61-91
-
-
Necula, G.C.1
Lee, P.2
-
29
-
-
0002464962
-
Pict: A programming language based on the pi-calculus
-
G. Plotkin, C. Stirling and M. Tofte, eds, MIT Press
-
B.C. Pierce and D.N. Turner, Pict: A programming language based on the pi-calculus, in: Proof, Language and Interaction: Essays in Honour of Robin Milner, G. Plotkin, C. Stirling and M. Tofte, eds, MIT Press, 1999.
-
(1999)
Proof, Language and Interaction: Essays in Honour of Robin Milner
-
-
Pierce, B.C.1
Turner, D.N.2
-
32
-
-
84878539063
-
Global/local subtyping and capability inference for a distributed π-calculus
-
Proceedings of ICALP '98
-
P. Sewell, Global/local subtyping and capability inference for a distributed π-calculus, in: Proceedings of ICALP '98, LNCS 1443, 1998, pp. 695-706.
-
(1998)
LNCS
, vol.1443
, pp. 695-706
-
-
Sewell, P.1
-
33
-
-
0003803690
-
-
Technical Report 498, Computer Laboratory, University of Cambridge, Aug.
-
P. Sewell, Applied π - a brief tutorial, Technical Report 498, Computer Laboratory, University of Cambridge, Aug. 2000.
-
(2000)
Applied π - A Brief Tutorial
-
-
Sewell, P.1
-
34
-
-
0013129446
-
-
Technical Report 463, Computer Laboratory, University of Cambridge, Apr.
-
P. Sewell and J. Vitek, Secure composition of insecure components, Technical Report 463, Computer Laboratory, University of Cambridge, Apr. 1999.
-
(1999)
Secure Composition of Insecure Components
-
-
Sewell, P.1
Vitek, J.2
-
36
-
-
0003475323
-
-
Technical Report 478, Computer Laboratory, University of Cambridge, Nov.
-
P. Sewell and J. Vitek, Secure composition of untrusted code: Wrappers and causality types, Technical Report 478, Computer Laboratory, University of Cambridge, Nov. 1999.
-
(1999)
Secure Composition of Untrusted Code: Wrappers and Causality Types
-
-
Sewell, P.1
Vitek, J.2
-
38
-
-
84957042631
-
Location-independent communication for mobile agents: A two-level architecture
-
Internet Programming Languages, Springer-Verlag
-
P. Sewell, P.T. Wojciechowski and B.C. Pierce, Location-independent communication for mobile agents: a two-level architecture, in: Internet Programming Languages, LNCS 1686, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1686
-
-
Sewell, P.1
Wojciechowski, P.T.2
Pierce, B.C.3
-
39
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
San Diego, California
-
G. Smith and D. Volpano, Secure information flow in a multi-threaded imperative language, in: Conference Record of POPL '98: The 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Diego, California, 1998, pp. 355-364.
-
(1998)
Conference Record of POPL '98: The 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
41
-
-
84945952027
-
From higher-order pi-calculus to pi-calculus in the presence of static operators
-
CONCUR '98: Concurrency Theory (9th International Conference), Nice, France, D. Sangiorgi and R. de Simone, eds, SV
-
J.-L. Vivas and M. Dam, From higher-order pi-calculus to pi-calculus in the presence of static operators, in: CONCUR '98: Concurrency Theory (9th International Conference), Nice, France, D. Sangiorgi and R. de Simone, eds, Vol. 1466 of LNCS, SV, 1998, pp. 115-130.
-
(1998)
LNCS
, vol.1466
, pp. 115-130
-
-
Vivas, J.-L.1
Dam, M.2
-
42
-
-
0001909368
-
Confinement properties for programming languages
-
D. Volpano and G. Smith, Confinement properties for programming languages, SIGACT News 29(3) (1998), 33-42.
-
(1998)
SIGACT News
, vol.29
, Issue.3
, pp. 33-42
-
-
Volpano, D.1
Smith, G.2
-
43
-
-
0001905093
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith and C. Irvine, A sound type system for secure flow analysis, Journal of Computer Security 4(3) (1996), 1-21.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 1-21
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
45
-
-
0002659052
-
Models for concurrency
-
S. Abramsky, D.M. Gabbay and T.S.E. Maibaum, eds, Oxford University Press
-
G. Winskel and M. Nielsen, Models for concurrency, in: Handbook of Logic in Computer Science, S. Abramsky, D.M. Gabbay and T.S.E. Maibaum, eds, Vol. IV, Oxford University Press, 1995, pp. 1-148.
-
(1995)
Handbook of Logic in Computer Science
, vol.4
, pp. 1-148
-
-
Winskel, G.1
Nielsen, M.2
-
46
-
-
17144422518
-
Principals in programming languages: A syntactic proof technique
-
Paris, France
-
S. Zdancewic, D. Grossman and G. Morrisett, Principals in programming languages: A syntactic proof technique, in: International Conference on Functional Programming, Paris, France, 1999.
-
(1999)
International Conference on Functional Programming
-
-
Zdancewic, S.1
Grossman, D.2
Morrisett, G.3
|