-
1
-
-
85017248930
-
Program analysis using mixed term and set constraints
-
AIKEN, A. S. AND FÄHNDRICH, M. 1997. Program analysis using mixed term and set constraints. In Static Analysis Symposium (SAS). 114-126. URL: http://www.cs.berkeley.edu/~aiken/publications/papers/sas97.ps.
-
(1997)
Static Analysis Symposium (SAS)
, pp. 114-126
-
-
Aiken, A.S.1
Fähndrich, M.2
-
2
-
-
0028013810
-
Soft typing with conditional types
-
ACM, New York
-
AIKEN, A. S., WIMMERS, E. L., AND LAKSHMAN, T. K. 1994. Soft typing with conditional types. In ACM Symposium on Principles of Programming Languages (POPL). ACM, New York, 163-173. URL: http://http.cs.berkeley.edu/~aiken/ftp/ popl94.ps.
-
(1994)
ACM Symposium on Principles of Programming Languages (POPL)
, pp. 163-173
-
-
Aiken, A.S.1
Wimmers, E.L.2
Lakshman, T.K.3
-
3
-
-
0004312442
-
A simple semantics and static analysis for Java security
-
Stevens Institute of Technology. June.
-
BANERJEE, A. AND NAUMANN, D. A. 2001. A simple semantics and static analysis for Java security. Tech. Rep. 2001-1, Stevens Institute of Technology. June. URL: http://guinness.cs.stevens-tech.edu/~naumann/publications/tr2001.ps.
-
(2001)
Tech. Rep.
, vol.2001
, Issue.1
-
-
Banerjee, A.1
Naumann, D.A.2
-
4
-
-
18944377182
-
Static analysis for stack inspection
-
Electronic Notes in Theoretical Computer Science. Elsevier Science, Amsterdam, The Netherlands
-
BARTOLETTI, M., DEGANO, P., AND FERRARI, G. 2001. Static analysis for stack inspection. In International Workshop on Concurrency and Coordination. Electronic Notes in Theoretical Computer Science, vol. 54. Elsevier Science, Amsterdam, The Netherlands.
-
(2001)
International Workshop on Concurrency and Coordination
, vol.54
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.3
-
5
-
-
0036989122
-
Secure calling contexts for stack inspection
-
ACM, New York
-
BESSON, F., DE GRENIER DE LATOUR, T., AND JENSEN, T. 2002. Secure calling contexts for stack inspection. In Proceedigs of the ACM International Conference on Principles and Practice of Declarative Programming (PPDP). ACM, New York, 76-87. URL: http://www.irisa.fr/lande/jensen/ppdp02.pdf.
-
(2002)
Proceedigs of the ACM International Conference on Principles and Practice of Declarative Programming (PPDP)
, pp. 76-87
-
-
Besson, F.1
De Grenier De Latour, T.2
Jensen, T.3
-
6
-
-
0034963556
-
Model checking security properties of control flow graphs
-
BESSON, F., JENSEN, T. P., LE MÉTAYER, D., AND THORN, T. 2001. Model checking security properties of control flow graphs. Journal of Computer Security 9, 3, 217-250. URL: http://www.irisa.fr/lande/jensen/jcs.pdf.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.3
, pp. 217-250
-
-
Besson, F.1
Jensen, T.P.2
Le Métayer, D.3
Thorn, T.4
-
7
-
-
21144446851
-
A tail-recursive semantics for stack inspections
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
CLEMENTS, J. AND FELLEISEN, M. 2003. A tail-recursive semantics for stack inspections. In Proceedings of the European Symposium on Programming (ESOP). Lecture Notes in Computer Science, vol. 2618. Springer-Verlag, New York, 22-37. URL: http://www.ccs.neu.edu/scheme/pubs/esop2003-cf.ps.gz.
-
(2003)
Proceedings of the European Symposium on Programming (ESOP)
, vol.2618
, pp. 22-37
-
-
Clements, J.1
Felleisen, M.2
-
15
-
-
84940106252
-
Verifying security properties of control-flow graphs
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
JENSEN, T., LE MÈTAYER, D., AND THORN, T. 1999. Verifying security properties of control-flow graphs. In Proceedings of the IEEE Symposium on Security and Privacy (S&P). IEEE Computer Society Press, Los Alamitos, Calif., 89-105. URL: http://www.irisa.fr/lande/jensen/papers/SP99.ps.
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy (S&P)
, pp. 89-105
-
-
Jensen, T.1
Le Mètayer, D.2
Thorn, T.3
-
16
-
-
0038108908
-
Access rights analysis for Java
-
ACM, New York
-
KOVED, L., PISTOIA, M., AND KERSHENBAUM, A. 2002. Access rights analysis for Java. In Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA). ACM, New York, 359-372. URL: http://www.research.ibm.com/javasec/OOPSLA2002preprint.pdf.
-
(2002)
Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA)
, pp. 359-372
-
-
Koved, L.1
Pistoia, M.2
Kershenbaum, A.3
-
17
-
-
84969377247
-
User authentication and authorization in the Java platform
-
LAI, C., GONG, L., KOVED, L., NADALIN, A. J., AND SCHEMERS, R. 1999. User authentication and authorization in the Java platform. In Proceedings of the Annual Computer Security Applications Conference. 285-290. URL: http://java.sun.com/people/gong/papers/jass.pdf.
-
(1999)
Proceedings of the Annual Computer Security Applications Conference
, pp. 285-290
-
-
Lai, C.1
Gong, L.2
Koved, L.3
Nadalin, A.J.4
Schemers, R.5
-
18
-
-
0024927385
-
Computational λ-calculus and monads
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
MOGGI, E. 1989. Computational λ-calculus and monads. In Proceedings of the IEEE Symposium on Logic in Computer Science (LICS). IEEE Computer Society Press, Los Alamitos, Calif., 14-23. URL: http://www.disi.unige. it/person/MoggiE/ftp/lics89.ps.gz.
-
(1989)
Proceedings of the IEEE Symposium on Logic in Computer Science (LICS)
, pp. 14-23
-
-
Moggi, E.1
-
20
-
-
0032761040
-
Type inference with constrained types
-
ODERSKY, M., SULZMANN, M., AND WEHR, M. 1999. Type inference with constrained types. Theory Pract. Obj. Syst. 5, 1, 35-55. URL: http://www.comp.nus.edu.sg/~sulzmann/publications/tapos.ps.
-
(1999)
Theory Pract. Obj. Syst.
, vol.5
, Issue.1
, pp. 35-55
-
-
Odersky, M.1
Sulzmann, M.2
Wehr, M.3
-
21
-
-
0038037654
-
Type-based analysis of uncaught exceptions
-
PESSAUX, F. AND LEROY, X. 2000. Type-based analysis of uncaught exceptions. ACM Trans. Prog. Lang. Syst. 22, 2, 340-377. URL: http://pauillac.inria.fr/~xleroy/publi/exceptions-toplas.ps.gz.
-
(2000)
ACM Trans. Prog. Lang. Syst.
, vol.22
, Issue.2
, pp. 340-377
-
-
Pessaux, F.1
Leroy, X.2
-
23
-
-
0042500274
-
A versatile constraint-based type inference system
-
POTTIER, F. 2000. A versatile constraint-based type inference system. Nordic J. Comput. 7, 4 (Nov.), 312-347. URL: http://pauillac.inria.fr/~fpottier/ publis/fpottier-njc-2000.ps.gz.
-
(2000)
Nordic J. Comput.
, vol.7
, Issue.4 NOV
, pp. 312-347
-
-
Pottier, F.1
-
24
-
-
0041967308
-
A constraint-based presentation and generalization of rows
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
POTTIER, F. 2003. A constraint-based presentation and generalization of rows. In Proceedings of the IEEE Symposium on Logic in Computer Science (LICS). IEEE Computer Society Press, Los Alamitos, Calif., 331-340. URL: http://pauillac.inria.fr/~fpottier/publis/fpottier-lics03.ps.gz.
-
(2003)
Proceedings of the IEEE Symposium on Logic in Computer Science (LICS)
, pp. 331-340
-
-
Pottier, F.1
-
26
-
-
84945270736
-
A systematic approach to static access control
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
POTTIER, F., SKALKA, C., AND SMITH, S. 2001. A systematic approach to static access control. In Proceedings of the European Symposium on Programming (ESOP). Lecture Notes in Computer Science, vol. 2028. Springer-Verlag, New York, 30-45. URL: http://pauillac.inria.fr/~fpottier/publis/fpottier-skalka-smith- esop01.ps.gz.
-
(2001)
Proceedings of the European Symposium on Programming (ESOP)
, vol.2028
, pp. 30-45
-
-
Pottier, F.1
Skalka, C.2
Smith, S.3
-
27
-
-
0004526324
-
Extending ML type system with a sorted equational theory
-
INRIA, Rocquencourt, BP 105, 78153 Le Chesnay Cedex, France
-
RÉMY, D. 1992a. Extending ML type system with a sorted equational theory. Tech. Rep. 1766, INRIA, Rocquencourt, BP 105, 78153 Le Chesnay Cedex, France. URL: ftp://ftp.inria.fr/INRIA/Projects/cristal/Didier.Remy/eq-theory-on- types.ps.gz.
-
(1992)
Tech. Rep.
, vol.1766
-
-
Rémy, D.1
-
29
-
-
1542766965
-
Type inference for records in a natural extension of ML
-
C. A. Gunter and J. C. Mitchell, Eds. MIT Press, Cambridge, Mass.
-
RÉMY, D. 1994. Type inference for records in a natural extension of ML. In Theoretical Aspects of Object-Oriented Programming. Types, Semantics and Language Design, C. A. Gunter and J. C. Mitchell, Eds. MIT Press, Cambridge, Mass. URL: ftp://ftp.inria.fr/INRIA/Projects/cristal/Didier.Remy/taoopl.ps.gz.
-
(1994)
Theoretical Aspects of Object-oriented Programming. Types, Semantics and Language Design
-
-
Rémy, D.1
-
30
-
-
84881225236
-
Enforceable security policies
-
SCHNEIDER, F. B. 2000. Enforceable security policies. ACM Trans. Inf. Syst. Sec. 3, 1 (Feb.), 1-50. URL: http://www.cs.cornell.edu/fbs/publications/ EnfSecPols.pdf.
-
(2000)
ACM Trans. Inf. Syst. Sec.
, vol.3
, Issue.1 FEB
, pp. 1-50
-
-
Schneider, F.B.1
-
31
-
-
27844456277
-
Type inference with structural subtyping: A faithful formalization of an efficient constraint solver
-
SIMONET, V. 2003. Type inference with structural subtyping: a faithful formalization of an efficient constraint solver. In Proceedings of the Asian Symposium on Programming Languages and Systems. URL: http://cristal.inria.fr/ ~simonet/publis/simonet-structural-subtyping.ps.gz.
-
(2003)
Proceedings of the Asian Symposium on Programming Languages and Systems
-
-
Simonet, V.1
-
32
-
-
14844285027
-
-
Ph.D. dissertation. The Johns Hopkins University
-
SKALKA, C. 2002. Types for programming language-based security. Ph.D. dissertation. The Johns Hopkins University. URL: http://www.cs.uvn.edu/~skalka/ skalka-pubs/skalka-phdthesis.ps.
-
(2002)
Types for Programming Language-based Security
-
-
Skalka, C.1
-
33
-
-
14844312689
-
Syntactic type soundness for HM(X)
-
Electronic Notes in Theoretical Computer Science 75
-
SKALKA, C. AND POTTIER, F. 2002. Syntactic type soundness for HM(X). In Proceedings of the Workshop on Types in Programming (TIP). Electronic Notes in Theoretical Computer Science, vol. 75. URL: http://pauillac.inria.fr/~fpottier/ publis/skalka-fpottier-tip-02.ps.gz.
-
(2002)
Proceedings of the Workshop on Types in Programming (TIP)
-
-
Skalka, C.1
Pottier, F.2
-
35
-
-
0025448350
-
A functional theory of exceptions
-
SPIVEY, M. 1990. A functional theory of exceptions. Sci. Comput. Prog. 14, 25-42.
-
(1990)
Sci. Comput. Prog.
, vol.14
, pp. 25-42
-
-
Spivey, M.1
-
36
-
-
84945287015
-
Entailment with conditional equality constraints
-
Lecture Notes in Computer Science. Springer-Verlag
-
SU, Z. AND AIKEN, A. 2001. Entailment with conditional equality constraints. In Proceedings of the European Symposium on Programming (ESOP). Lecture Notes in Computer Science, vol. 2028. Springer-Verlag, 170-189. URL: http://www.cs.ucdavis.edu/~su/publications/esop01.pdf.
-
(2001)
Proceedings of the European Symposium on Programming (ESOP)
, vol.2028
, pp. 170-189
-
-
Su, Z.1
Aiken, A.2
-
38
-
-
0005253318
-
Hindley/Milner style type systems in constraint form
-
University of South Australia, School of Computer and Information Science. July
-
SULZMANN, M., MÜLLER, M., AND ZENGER, C. 1999. Hindley/Milner style type systems in constraint form. Research Report ACRC-99-009, University of South Australia, School of Computer and Information Science. July. URL: http://www.ps.uni-sb.de/~mmueller/papers/hm-constraints.ps.gz.
-
(1999)
Research Report
, vol.ACRC-99-009
-
-
Sulzmann, M.1
Müller, M.2
Zenger, C.3
-
39
-
-
4344630108
-
Enforcing security properties using type specialization
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
THIEMANN, P. 2001. Enforcing security properties using type specialization. In Proceedings of the European Symposium on Programming (ESOP). Lecture Notes in Computer Science. Springer-Verlag, New York, URL: http://www.informatik.uni-freiburg.de/~thiemann/papers/espps-het.ps.gz.
-
(2001)
Proceedings of the European Symposium on Programming (ESOP)
-
-
Thiemann, P.1
-
40
-
-
3042814322
-
The marriage of effects and monads
-
WADLER, P. AND THIEMANN, P. 2003. The marriage of effects and monads. ACM Trans. Comput. Logic 4, 1 (Jan.), 1-32. URL: http://www.research.avayalabs.com/ user/wadler/papers/effectstocl/effectstocl.ps.gz.
-
(2003)
ACM Trans. Comput. Logic
, vol.4
, Issue.1 JAN
, pp. 1-32
-
-
Wadler, P.1
Thiemann, P.2
-
43
-
-
0003396725
-
-
Ph.D. dissertation, Princeton University
-
WALLACH, D. S. 1999. A new approach to mobile code security. Ph.D. dissertation, Princeton University. URL: http://www.cs.princeton.edu/sip/pub/ dwallach-dissertation.html.
-
(1999)
A New Approach to Mobile Code Security
-
-
Wallach, D.S.1
-
44
-
-
0039334688
-
SAFKASI: A security mechanism for language-based systems
-
WALLACH, D. S., APPEL, A. W., AND FELTEN, E. W. 2000. SAFKASI: A security mechanism for language-based systems. ACM Trans. Softw. Eng. Method. 9, 4 (Oct.), 341-378. URL: http://www.cs.rice.edu/~dwallach/pub/tosem2000.ps.
-
(2000)
ACM Trans. Softw. Eng. Method.
, vol.9
, Issue.4 OCT
, pp. 341-378
-
-
Wallach, D.S.1
Appel, A.W.2
Felten, E.W.3
-
45
-
-
0030777956
-
A practical soft type system for Scheme
-
WRIGHT, A. K. AND CARTWRIGHT, R. 1997. A practical soft type system for Scheme. ACM Trans. Prog. Lang. Syst. 19, 1 (Jan.), 87-152. URL: http://doi.acm.org/10.1145/239912.239917.
-
(1997)
ACM Trans. Prog. Lang. Syst.
, vol.19
, Issue.1 JAN
, pp. 87-152
-
-
Wright, A.K.1
Cartwright, R.2
-
46
-
-
0003025818
-
A syntactic approach to type soundness
-
WRIGHT, A. K. AND FELLEISEN, M. 1994. A syntactic approach to type soundness. Inf. Comput. 115, 1 (Nov.), 38-94. URL: http://www.cs.rice.edu/CS/ PLT/Publications/Scheme/ic94-wf.ps.gz.
-
(1994)
Inf. Comput.
, vol.115
, Issue.1 NOV
, pp. 38-94
-
-
Wright, A.K.1
Felleisen, M.2
|