-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
Abadi, M., Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, 1999.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
0005363804
-
A core calculus of dependency
-
ACM
-
Abadi, M., Banerjee, A., Heintze, N. and Riecke, J., A core calculus of dependency, POPL'99, ACM, 1999.
-
(1999)
POPL'99
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.4
-
3
-
-
84890865854
-
Access Control based on Execution History
-
California
-
Abadi, M. and Fournet, C, Access Control based on Execution History, NDSS'03, California, 2003.
-
(2003)
NDSS'03
-
-
Abadi, M.1
Fournet, C.2
-
4
-
-
0034672933
-
Full abstraction for PCF
-
Abramsky, S., Jagadeesan, R. and Malacaria, P., Full Abstraction for PCF, 1994. Info. & Camp. 163 (2000), 409-470.
-
(2000)
1994. Info. & Camp.
, vol.163
, pp. 409-470
-
-
Abramsky, S.1
Jagadeesan, R.2
Malacaria, P.3
-
5
-
-
84888883433
-
Sequentiality and the π-Calculus
-
2044, Springer
-
Berger, M., Honda, K. and Yoshida, N., Sequentiality and the π-Calculus, TLCA01, LNCS 2044, 29-45, Springer, 2001.
-
(2001)
TLCA01
, pp. 29-45
-
-
Berger, M.1
Honda, K.2
Yoshida, N.3
-
6
-
-
35248866941
-
Genericity and the π-Calculus
-
LNCS 2620, Springer
-
Berger, M., Honda, K. and Yoshida, N., Genericity and the π-Calculus, FoSSaCs'03, LNCS 2620, 103-119, Springer, 2003.
-
(2003)
FoSSaCs'03
, pp. 103-119
-
-
Berger, M.1
Honda, K.2
Yoshida, N.3
-
7
-
-
1442284573
-
-
UCAM-CL-TR-563, Cambridge
-
Bierman, G.M., Parkinson, M.J and Pitts, A.M., MJ: an imperative core calculus for Java and Java with effects, UCAM-CL-TR-563, Cambridge, 2003.
-
(2003)
MJ: An Imperative Core Calculus for Java and Java with Effects
-
-
Bierman, G.M.1
Parkinson, M.J.2
Pitts, A.M.3
-
9
-
-
1442309168
-
-
Castagna, G., Vitek, J. and Zappa, F., The seal calculus, 2003, available from ftp://ftp.di.ens.fr/pub/castagna/.
-
(2003)
The Seal Calculus
-
-
Castagna, G.1
Vitek, J.2
Zappa, F.3
-
10
-
-
12444299406
-
Information Flow Security in Boxed Ambients
-
Crafa, S., Bugliesi, M. and Castagna, G., Information Flow Security in Boxed Ambients, ENTCS 66 No. 3, 2003.
-
(2003)
ENTCS
, vol.66
, Issue.3
-
-
Crafa, S.1
Bugliesi, M.2
Castagna, G.3
-
11
-
-
0017517624
-
Certification of programs for secure information flow
-
ACM
-
Denning, D. and Denning, P., Certification of programs for secure information flow. Communication of ACM, ACM, 20:504-513, 1997.
-
(1997)
Communication of ACM
, vol.20
, pp. 504-513
-
-
Denning, D.1
Denning, P.2
-
12
-
-
0036041144
-
Stack inspection: Theory and variants
-
ACM
-
Foumet, C. and Gordon, A.D., Stack Inspection: theory and variants, POPL, 307-318, ACM, 2002.
-
(2002)
POPL
, pp. 307-318
-
-
Foumet, C.1
Gordon, A.D.2
-
13
-
-
0038414953
-
Typing correspondence assertions for communication protocols
-
Gordon, A. and Jeffery, A., Typing correspondence assertions for communication protocols, TCS, 300(2003):379-409.
-
TCS
, vol.300
, Issue.2003
, pp. 379-409
-
-
Gordon, A.1
Jeffery, A.2
-
14
-
-
0041865338
-
Separating access control policy, enforcement, and functionality in extensible systems
-
Feb.
-
Grimm, R. and Bershad, B., Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems, ACM Transactions on Computer Systems, 19(1):36-70, Feb., 2001.
-
(2001)
ACM Transactions on Computer Systems
, vol.19
, Issue.1
, pp. 36-70
-
-
Grimm, R.1
Bershad, B.2
-
16
-
-
0031701347
-
The SLam Calculus: Programming with Secrecy and Integrity
-
ACM Press
-
Heintze, N. and Riecke, J., The SLam Calculus: Programming with Secrecy and Integrity, POPL'98, pp.365-377. ACM Press, 1998.
-
(1998)
POPL'98
, pp. 365-377
-
-
Heintze, N.1
Riecke, J.2
-
17
-
-
4043052876
-
SafeDpi: A language for controlling mobile code
-
Hennessy, M., Rathke, J. and Yoshida, N, SafeDpi: a language for controlling mobile code, Sussex Technical Report, 2003/02, 2003.
-
(2003)
Sussex Technical Report
, vol.2003
, Issue.2
-
-
Hennessy, M.1
Rathke, J.2
Yoshida, N.3
-
18
-
-
0029719979
-
Composing processes
-
ACM
-
Honda, K., Composing Processes, POPL'96, pp.344-357, ACM, 1996.
-
(1996)
POPL'96
, pp. 344-357
-
-
Honda, K.1
-
19
-
-
84947269249
-
Secure information flow as typed process behaviour
-
LNCS 1782, Springer
-
Honda, K., Vasconcelos, V. and Yoshida, N, Secure Information Flow as Typed Process Behaviour, ESOP'OO, LNCS 1782, pp.180-199, Springer, 2000.
-
(2000)
ESOP'OO
, pp. 180-199
-
-
Honda, K.1
Vasconcelos, V.2
Yoshida, N.3
-
20
-
-
0029404929
-
On reduction-based process semantics
-
North-Holland
-
Honda, K. and Yoshida, N., On Reduction-Based Process Semantics. TCS, pp.437-486, No. 151, North-Holland, 1995.
-
(1995)
TCS
, Issue.151
, pp. 437-486
-
-
Honda, K.1
Yoshida, N.2
-
21
-
-
0000423953
-
Game-theoretic analysis of call-by-value computation
-
North-Holland
-
Honda, K. and Yoshida, N. Game-theoretic analysis of call-by-value computation. TCS Vol. 221 (1999), 393-456, North-Holland, 1999.
-
(1999)
TCS
, vol.221
, Issue.1999
, pp. 393-456
-
-
Honda, K.1
Yoshida, N.2
-
22
-
-
0036040303
-
A uniform type structure for secure information flow
-
ACM Prcess, The full version: a DOC technical report, Imperial College London, revised August 2003
-
Honda, K. and Yoshida, N., A Uniform Type Structure for Secure Information Flow, POPL'02, 81-92, ACM Press, 2002. The full version: a DOC technical report, Imperial College London, revised August 2003, available at: www.doc.ic.ac.uk/~yoshdia.
-
(2002)
POPL'02
, pp. 81-92
-
-
Honda, K.1
Yoshida, N.2
-
24
-
-
0034672932
-
On full abstraction for PCF: I, II and III
-
Hyland, M. and Ong, L., "On Full Abstraction for PCF": I, II and III. Info. & Comp. 163 (2000), 285-408.
-
(2000)
Info. & Comp.
, vol.163
, pp. 285-408
-
-
Hyland, M.1
Ong, L.2
-
25
-
-
0036039869
-
Resource Usage Analysis
-
Portland, OR, ACM
-
Igarashi, A. and Kobayashi, N., Resource Usage Analysis, POPL'02, 331-342, Portland, OR, ACM, 2002.
-
(2002)
POPL'02
, pp. 331-342
-
-
Igarashi, A.1
Kobayashi, N.2
-
26
-
-
0035029826
-
A generic type system for the pi-calculus
-
ACM, To appear in TCS
-
Igarashi, A. and Kobayashi, N., A Generic Type System for the Pi-Calculus, POPL'01, 128-141, ACM, 2001. To appear in TCS.
-
(2001)
POPL'01
, pp. 128-141
-
-
Igarashi, A.1
Kobayashi, N.2
-
27
-
-
0012583283
-
Featherweight Java: A Minimal Core Calculus for Java and GJ
-
May
-
Igarashi, A., Pierce, B. and Wadler, P., Featherweight Java: A Minimal Core Calculus for Java and GJ. TOPLAS, 23(3):396-450, May 2001.
-
(2001)
TOPLAS
, vol.23
, Issue.3
, pp. 396-450
-
-
Igarashi, A.1
Pierce, B.2
Wadler, P.3
-
28
-
-
84862362113
-
-
Java, Sun Microsystems Inc., http://www.javasoft.com/.
-
-
-
-
29
-
-
24644505297
-
Contextual equivalence for higher-order pi-calculus revisited
-
Montreal
-
Jeffrey, A. and Rathke, J., Contextual equivalence for higher-order pi-calculus revisited, MFPS XIX, Montreal, 2003.
-
(2003)
MFPS XIX
-
-
Jeffrey, A.1
Rathke, J.2
-
31
-
-
0001065208
-
Linear types and the π-calculus
-
Kobayashi, N., Pierce, B., and Turner, D., Linear types and the π-calculus, TOPLAS, 21(5):914-947, 1999.
-
(1999)
TOPLAS
, vol.21
, Issue.5
, pp. 914-947
-
-
Kobayashi, N.1
Pierce, B.2
Turner, D.3
-
33
-
-
0032646625
-
JFlow: Practical mostly-static information flow control
-
Myers, M., JFlow: Practical mostly-static information flow control. POPL'99, 228-241, 1999.
-
(1999)
POPL'99
, pp. 228-241
-
-
Myers, M.1
-
35
-
-
44049113210
-
A calculus of mobile processes
-
Milner, R., Parrow, J.G. and Walker, D.J., A Calculus of Mobile Processes. Info. & Comp., 100(1), pp.1-77, 1992.
-
(1992)
Info. & Comp.
, vol.100
, Issue.1
, pp. 1-77
-
-
Milner, R.1
Parrow, J.G.2
Walker, D.J.3
-
36
-
-
0002735526
-
Proof-carrying code
-
ACM
-
Necula, G., Proof-carrying code. POPL'96, ACM, 1996.
-
(1996)
POPL'96
-
-
Necula, G.1
-
38
-
-
0002772957
-
A systematic approach to access control
-
LNCS 30-45, Springer
-
Pottier, F., Skalka, C. and Smith, S., A systematic approach to access control. ESOP01, LNCS 30-45, Springer, 2001.
-
(2001)
ESOP01
-
-
Pottier, F.1
Skalka, C.2
Smith, S.3
-
39
-
-
0032646395
-
Trust and partial typing in open systems of mobile agents
-
ACM Press
-
Riely, J. and Hennessy, M., Trust and partial typing in open systems of mobile agents. POPL'99, ACM Press, 1999.
-
(1999)
POPL'99
-
-
Riely, J.1
Hennessy, M.2
-
41
-
-
1442333573
-
Asynchronous process calculi: The first-order and higher-order paradigms
-
Sangiorgi, D., Asynchronous process calculi: the first-order and higher-order paradigms, TCS, 1999.
-
(1999)
TCS
-
-
Sangiorgi, D.1
-
42
-
-
2442537413
-
Termination of processes
-
Sangiorgi, D., Termination of Processes, CONCUR'02, 2002
-
(2002)
CONCUR'02
-
-
Sangiorgi, D.1
-
43
-
-
0038643976
-
The M-calculus: A higher-order distributed process calculus
-
ACM
-
Schmitt, A. and Stefani, J.-B., The M-calculus: A Higher-Order Distributed Process Calculus, POPL03, ACM, 2003.
-
(2003)
POPL03
-
-
Schmitt, A.1
Stefani, J.-B.2
-
44
-
-
0037272061
-
Secure composition of untrusted code: Box pi, wrappers, and causality types
-
Sewell, P. and Vitek, J., Secure Composition of Untrusted Code: Box pi, Wrappers, and Causality Types. Vol. 11, Number 2, 135-188, Journal of Computer Security, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.2
, pp. 135-188
-
-
Sewell, P.1
Vitek, J.2
-
45
-
-
0034835461
-
A new type system for secure information flow
-
IEEE
-
Smith, G., A New Type System for Secure Information Flow, CSFW'01, IEEE, 2001.
-
(2001)
CSFW'01
-
-
Smith, G.1
-
46
-
-
0031648455
-
Secure information flow in a multithreaded imperative language
-
ACM
-
Smith, G. and Volpano, D., Secure information flow in a multithreaded imperative language, pp.355-364, POPL'98, ACM, 1998.
-
(1998)
POPL'98
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
47
-
-
85024747258
-
Typed concurrent objects
-
LNCS 821, Springer-Verlag
-
Vasconcelos, V., Typed concurrent objects. ECOOP'94, LNCS 821, pp.100-117. Springer-Verlag, 1994.
-
(1994)
ECOOP'94
, pp. 100-117
-
-
Vasconcelos, V.1
-
48
-
-
0031542975
-
Extensible security architectures for Java
-
IEEE
-
Wallach, D.S, et al., Extensible security architectures for Java. SOSP, 116-128, IEEE, 1997.
-
(1997)
SOSP
, pp. 116-128
-
-
Wallach, D.S.1
-
50
-
-
2442628728
-
Nomadic pict: Correct communication infrastructure for mobile computation
-
ACM
-
Unypoth, A. and Sewell, P., Nomadic Pict: Correct Communication Infrastructure for Mobile Computation, POPL01, ACM, 2001.
-
(2001)
POPL01
-
-
Unypoth, A.1
Sewell, P.2
-
51
-
-
84947920982
-
Graph types for monadic mobile processes
-
LNCS 1180, Springer, Full version as LFCS Technical Report, ECS-LFCS-96-350, 1996
-
Yoshida, N., Graph Types for Monadic Mobile Processes, FSTTCS'16, LNCS 1180, pp. 371-386, Springer, 1996. Full version as LFCS Technical Report, ECS-LFCS-96-350, 1996.
-
(1996)
FSTTCS'16
, pp. 371-386
-
-
Yoshida, N.1
-
52
-
-
1442284569
-
Type-based liveness guarantee in the presence of nontermination and nondeterminism
-
April, University of Leicester
-
Yoshida, N., Type-Based Liveness Guarantee in the Presence of Nontermination and Nondeterminism, April 2002. MCS Technical Report, 2002-20, University of Leicester, available at www.mcs.le.ac.uk/~yoshida.
-
(2002)
MCS Technical Report
, vol.2002
, Issue.20
-
-
Yoshida, N.1
-
53
-
-
0034871529
-
Strong normalisation in the π-Calculus
-
LICS'01, IEEE, Full version: to appear
-
Yoshida, N., Berger, M. and Honda, K., Strong Normalisation in the π-Calculus, LICS'01, 311-322, IEEE, 2001. Full version: to appear in Journal of Info. & Comp., available at www.dos.ic.ac.uk/~yoshida.
-
(2001)
Journal of Info. & Comp.
, pp. 311-322
-
-
Yoshida, N.1
Berger, M.2
Honda, K.3
-
54
-
-
84888256815
-
Subtyping and locality in distributed higher order processes
-
LNCS 1664, Springer
-
Yoshida, N. and Hennessy, M., Subtyping and Locality in Distributed Higher Order Processes. CONCUR'99, LNCS 1664, pp.557-573, Springer, 1999.
-
(1999)
CONCUR'99
, pp. 557-573
-
-
Yoshida, N.1
Hennessy, M.2
-
55
-
-
0036590522
-
Assigning types to processes
-
Academic Press, Extended abstract appeared in LICS'00
-
Yoshida, N. and Hennessy, M., Assigning Types to Processes, Info. &. Comp., Volume 174, Issue 2, 143-179, Academic Press, 2002. Extended abstract appeared in LICS'00.
-
(2002)
Info. &. Comp.
, vol.174
, Issue.2
, pp. 143-179
-
-
Yoshida, N.1
Hennessy, M.2
-
56
-
-
19044369934
-
Linearity and bisimulation
-
FoSSaCs 2002, Springer
-
Yoshida, N., Honda, K. and Berger, M. Linearity and Bisimulation, FoSSaCs 2002, LNCS 2303, pp.417-433, Springer, 2002.
-
(2002)
LNCS
, vol.2303
, pp. 417-433
-
-
Yoshida, N.1
Honda, K.2
Berger, M.3
-
57
-
-
84862361628
-
-
The full version of this paper, Part I, II and III
-
The full version of this paper, Part I, II and III, available at www.doc.ic.ac.uk/~yoshida
-
-
-
|