메뉴 건너뛰기




Volumn 3995 LNCS, Issue , 2006, Pages 321-336

Allowing state changes in specifications

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; DATA TRANSFER; INFORMATION TECHNOLOGY; SECURITY OF DATA; SYSTEMS ANALYSIS; THEOREM PROVING;

EID: 33746628954     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11766155_23     Document Type: Conference Paper
Times cited : (8)

References (36)
  • 2
    • 33745806932 scopus 로고    scopus 로고
    • A logic for information flow in object-oriented programs
    • Extended version available as KSU ClS-TR-2005-1
    • T. Amtoft, S. Bandhakavi, and A. Banerjee. A logic for information flow in object-oriented programs. In POPL, 2006.
    • (2006) POPL
    • Amtoft, T.1    Bandhakavi, S.2    Banerjee, A.3
  • 3
    • 84941147655 scopus 로고    scopus 로고
    • Extended version
    • Extended version available as KSU ClS-TR-2005-1.
    • KSU ClS-TR-2005-1
  • 4
    • 33745220946 scopus 로고    scopus 로고
    • Ownership confinement ensures representation independence for object-oriented programs
    • November
    • Anindya Banerjee and David A. Naumann. Ownership confinement ensures representation independence for object-oriented programs. Journal of the ACM, 52(6):894-960, November 2005.
    • (2005) Journal of the ACM , vol.52 , Issue.6 , pp. 894-960
    • Banerjee, A.1    Naumann, D.A.2
  • 5
    • 17044429386 scopus 로고    scopus 로고
    • Stack-based access control for secure information flow
    • Anindya Banerjee and David A. Naumann. Stack-based access control for secure information flow. Journal of Functional Programming, 15(2):131-177, 2005.
    • (2005) Journal of Functional Programming , vol.15 , Issue.2 , pp. 131-177
    • Banerjee, A.1    Naumann, D.A.2
  • 12
    • 33746623518 scopus 로고    scopus 로고
    • Allowing state changes in specifications
    • Microsoft Research
    • Mike Barnett, David A. Naumann, Wolfram Schulte, and Qi Sun. Allowing state changes in specifications. Technical Report MSR-TR-2006-22, Microsoft Research, 2006.
    • (2006) Technical Report , vol.MSR-TR-2006-22
    • Barnett, M.1    Naumann, D.A.2    Schulte, W.3    Sun, Q.4
  • 15
    • 0037493357 scopus 로고    scopus 로고
    • Dissertation, Computer Science and Engineering, University of New South Wales, Australia
    • David Clarke. Object ownership and containment. Dissertation, Computer Science and Engineering, University of New South Wales, Australia, 2001.
    • (2001) Object Ownership and Containment
    • Clarke, D.1
  • 16
    • 0037586483 scopus 로고    scopus 로고
    • Ownership, encapsulation and the disjointness of type and effect
    • November
    • David Clarke and Sophia Drossopoulou. Ownership, encapsulation and the disjointness of type and effect. In OOPSLA, pages 292-310, November 2002.
    • (2002) OOPSLA , pp. 292-310
    • Clarke, D.1    Drossopoulou, S.2
  • 18
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D. Denning and P. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504-513, 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.1    Denning, P.2
  • 20
    • 0035551973 scopus 로고    scopus 로고
    • Encapsulating objects with confined types
    • Christian Grothoff, Jens Palsberg, and Jan Vitek. Encapsulating objects with confined types. In OOPSLA, 2001.
    • (2001) OOPSLA
    • Grothoff, C.1    Palsberg, J.2    Vitek, J.3
  • 21
    • 0015482118 scopus 로고
    • Proofs of correctness of data representations
    • C. A. R. Hoare. Proofs of correctness of data representations. Acta Informatica, 1:271-281, 1972.
    • (1972) Acta Informatica , vol.1 , pp. 271-281
    • Hoare, C.A.R.1
  • 22
    • 0002820732 scopus 로고
    • The Geneva Convention on the treatment of object aliasing
    • John Hogg, Doug Lea, Alan Wills, Dennis deChampeaux, and Richard Holt. The Geneva Convention on the treatment of object aliasing. OOPS Messenger, 3(2): 11-16, 1992.
    • (1992) OOPS Messenger , vol.3 , Issue.2 , pp. 11-16
    • Hogg, J.1    Lea, D.2    Wills, A.3    Dechampeaux, D.4    Holt, R.5
  • 23
    • 24244442616 scopus 로고    scopus 로고
    • How the design of JML accomodates both runtime assertion checking and formal verification
    • Department of Computer Science, Iowa State University, March
    • Gary Leavens, Yoonsik Cheon, Curtis Clifton, Clyde Ruby, and David R. Cok. How the design of JML accomodates both runtime assertion checking and formal verification. Technical Report 03-04, Department of Computer Science, Iowa State University, March 2003.
    • (2003) Technical Report , vol.3 , Issue.4
    • Leavens, G.1    Cheon, Y.2    Clifton, C.3    Ruby, C.4    Cok, D.R.5
  • 24
    • 0142245536 scopus 로고    scopus 로고
    • How the design of JML accommodates both runtime assertion checking and formal verification
    • Frank S. de Boer, Marcello M. Bonsangue, Susanne Graf, and Willem-Paul de Roever, editors, Formal Methods for Components and Objects (FMCO 2002), Springer
    • Gary T. Leavens, Yoonsik Cheon, Curtis Clifton, Clyde Ruby, and David R. Cok. How the design of JML accommodates both runtime assertion checking and formal verification. In Frank S. de Boer, Marcello M. Bonsangue, Susanne Graf, and Willem-Paul de Roever, editors, Formal Methods for Components and Objects (FMCO 2002), volume 2852 of LNCS, pages 262-284. Springer, 2003.
    • (2003) LNCS , vol.2852 , pp. 262-284
    • Leavens, G.T.1    Cheon, Y.2    Clifton, C.3    Ruby, C.4    Cok, D.R.5
  • 30
    • 0032646625 scopus 로고    scopus 로고
    • JFlow: Practical mostly-static information flow control
    • Andrew C. Myers. JFlow: Practical mostly-static information flow control. In ACM Symp. on Princ. of Program. Lang. (POPL), pages 228-241, 1999.
    • (1999) ACM Symp. on Princ. of Program. Lang. (POPL) , pp. 228-241
    • Myers, A.C.1
  • 35
    • 18044380589 scopus 로고    scopus 로고
    • A combined pointer and purity analysis for Java programs
    • Department of Computer Science, Massachusetts Institute of Technology, May
    • Alexandru Sǎlcianu and Martin Rinard. A combined pointer and purity analysis for Java programs. Technical Report MIT-CSAIL-TR-949, Department of Computer Science, Massachusetts Institute of Technology, May 2004.
    • (2004) Technical Report , vol.MIT-CSAIL-TR-949
    • Sǎlcianu, A.1    Rinard, M.2
  • 36
    • 35048864843 scopus 로고    scopus 로고
    • Modular and constraint-based information flow inference for an object-oriented language
    • Roberto Giacobazzi, editor, Static Analysis Symposium (SAS), Springer-Verlag
    • Qi Sun, Anindya Banerjee, and David A. Naumann. Modular and constraint-based information flow inference for an object-oriented language. In Roberto Giacobazzi, editor, Static Analysis Symposium (SAS), volume 3148 of LNCS, pages 84-99. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3148 , pp. 84-99
    • Sun, Q.1    Banerjee, A.2    Naumann, D.A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.