-
1
-
-
35248858397
-
Using coq to verify java card applet isolation properties
-
Theorem proving in higher order logics Springer, Heidelberg
-
Andronick J, Chetali B, Ly O (2003) Using Coq to verify Java Card Applet Isolation Properties. Theorem proving in higher order logics, TPHOLs'03. LNCS, vol 2758. Springer, Heidelberg
-
(2003)
TPHOLs'03. LNCS
, vol.2758
-
-
Andronick, J.1
Chetali, B.2
Ly, O.3
-
2
-
-
43449083094
-
-
Bicolano and MOBIUS base logic
-
Bicolano and MOBIUS base logic. http://mobius.inria.fr/twiki/bin/view/ Bicolano, 2007
-
-
-
-
3
-
-
17044429386
-
Stack-based access control for secure information flow
-
2
-
Banerjee A, Naumann DA (2003) Stack-based access control for secure information flow. J Funct Program 15(2):131-177
-
(2003)
J Funct Program
, vol.15
, pp. 131-177
-
-
Banerjee, A.1
Naumann, D.A.2
-
4
-
-
43449107881
-
Security types preserving compilation. Verification, model checking, and abstract interpretation
-
Springer, Heidelberg
-
Barthe G, Basu A, Rezk T (2004) Security types preserving compilation. Verification, model checking, and abstract interpretation, VMCAI'04. LNCS, vol 2934. Springer, Heidelberg
-
(2004)
VMCAI'04. LNCS
, vol.2934
-
-
Barthe, G.1
Basu, A.2
Rezk, T.3
-
5
-
-
35048881016
-
A Tool-assisted framework for certified bytecode verification. Fundamental approaches to software engineering
-
Springer, Heidelberg
-
Barthe G, Dufay G (2004) A Tool-assisted framework for certified bytecode verification. Fundamental approaches to software engineering, FASE 2004. LNCS, vol 2984. Springer, Heidelberg
-
(2004)
FASE 2004. LNCS
, vol.2984
-
-
Barthe, G.1
Dufay, G.2
-
7
-
-
0003400251
-
-
Technical Report MTR-2547(2), MITRE Corp. Bedford, 1973. Reprinted in J Comput Secur 4(2-3):239-263. IOS Press
-
Bell DE, LaPadula LJ (1996) Secure Computer systems: a mathematical model. Technical Report MTR-2547(2), MITRE Corp. Bedford, 1973. Reprinted in J Comput Secur 4(2-3):239-263. IOS Press
-
(1996)
Secure Computer Systems: A Mathematical Model
-
-
Bell, D.E.1
Lapadula, L.J.2
-
10
-
-
0003765587
-
-
National Institute of Standards and Technology US Department of Commerce, National Bureau of Standards and Technology
-
National Institute of Standards and Technology (2005) Common criteria for information technology security evaluation. US Department of Commerce, National Bureau of Standards and Technology. http://csrc.nist.gov/cc
-
(2005)
Common Criteria for Information Technology Security Evaluation
-
-
-
11
-
-
35248831239
-
Implementing modules in the Coq system
-
Theorem proving in higher order logics Springer, Heidelberg
-
Chrzaszcz J (2003) Implementing modules in the Coq system. In: Theorem proving in higher order logics, TPHOLs 2003. LNCS, vol 2758. Springer, Heidelberg, pp 270-286
-
(2003)
TPHOLs 2003. LNCS
, vol.2758
, pp. 270-286
-
-
Chrzaszcz, J.1
-
12
-
-
0003180840
-
A formulation of the simple theory of types
-
2
-
Church A (1940) A formulation of the simple theory of types. J Symb Logic 5(2):56-68
-
(1940)
J Symb Logic
, vol.5
, pp. 56-68
-
-
Church, A.1
-
13
-
-
84944233413
-
Inductively defined types
-
Martin-Löf P, Mints G (eds) International conference in computer logic Springer, Heidelberg
-
Coquand T, Paulin-Mohring C (1990) Inductively defined types. In: Martin-Löf P, Mints G (eds) International conference in computer logic, Colog'88. LNCS, vol 417. Springer, Heidelberg
-
(1990)
Colog'88. LNCS
, vol.417
-
-
Coquand, T.1
Paulin-Mohring, C.2
-
15
-
-
0017517624
-
Certification of programs for secure information flow
-
7
-
Denning DE, Denning PJ (1977) Certification of programs for secure information flow. Commun ACM 20(7):504-513
-
(1977)
Commun ACM
, vol.20
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
19
-
-
0000952504
-
Formalising the Safety of Java, the Java Virtual Machine and Java Card
-
4
-
Härtel PH, Moreau L (2001) Formalising the Safety of Java, the Java Virtual Machine and Java Card. ACM Comput Surv (CSUR) 33(4):517-558
-
(2001)
ACM Comput Surv (CSUR)
, vol.33
, pp. 517-558
-
-
Härtel, P.H.1
Moreau, L.2
-
20
-
-
0002386430
-
The formulae-as-types notion of construction
-
Seldin JP, Hindley JR (eds) Academic, NY
-
Howard WA (1980) The formulae-as-types notion of construction. In: Seldin JP, Hindley JR (eds) To H.B. Curry: Essays on combinatory logic, lambda-calculus, and formalism. Academic, NY, pp 479-490
-
(1980)
To H.B. Curry: Essays on Combinatory Logic, Lambda-calculus, and Formalism
, pp. 479-490
-
-
Howard, W.A.1
-
21
-
-
0033751850
-
A semantic approach to secure information flow
-
Joshi R, Leino KRM (2000) A semantic approach to secure information flow. Sci Comput Programm 37:113-138
-
(2000)
Sci Comput Programm
, vol.37
, pp. 113-138
-
-
Joshi, R.1
Leino, K.R.M.2
-
22
-
-
33749545453
-
-
PhD thesis, Computer Laboratory, University of Cambridge, Technical Report 470
-
Kammüller F (1999) Modular reasoning in isabelle. PhD thesis, Computer Laboratory, University of Cambridge, Technical Report 470
-
(1999)
Modular Reasoning in Isabelle
-
-
Kammüller, F.1
-
23
-
-
43449114692
-
-
Kammüller F. http://www.swt.cs.tu-berlin.de/~flokam/coq/index.html
-
-
-
Kammüller, F.1
-
24
-
-
0033341745
-
A formal proof of Sylow's first theorem-an experiment in abstract algebra with isabelle HOL
-
3
-
Kammüller F, Paulson LC (1999) A formal proof of Sylow's first theorem-an experiment in abstract algebra with isabelle HOL. J Autom Reason 23(3):235-264
-
(1999)
J Autom Reason
, vol.23
, pp. 235-264
-
-
Kammüller, F.1
Paulson, L.C.2
-
25
-
-
0037432611
-
Verified bytecode verifiers
-
3
-
Klein G, Nipkow T (2002) Verified bytecode verifiers. Theor Comput Sci 298(3):583-626
-
(2002)
Theor Comput Sci
, vol.298
, pp. 583-626
-
-
Klein, G.1
Nipkow, T.2
-
26
-
-
0042733585
-
Java bytecode verification: Algorithms and formalizations
-
3-4
-
Leroy X (2003) Java bytecode verification: algorithms and formalizations. J Autom Reason Special Issue Bytecode Verif 30(3-4):235-269
-
(2003)
J Autom Reason Special Issue Bytecode Verif
, vol.30
, pp. 235-269
-
-
Leroy, X.1
-
28
-
-
43449097113
-
-
Mobius: Mobility, Ubiquity and Security
-
Mobius: Mobility, Ubiquity and Security (2007). http://mobius.inria.fr/ twiki/bin/view/Mobius
-
(2007)
-
-
-
29
-
-
84949231907
-
Foundations of modular SOS
-
Mathematical Foundations of Computer Science Springer, Heidelberg
-
Mosses PD (1999) Foundations of modular SOS. In: Mathematical Foundations of Computer Science, MFCS'99. LNCS, vol 1672. Springer, Heidelberg
-
(1999)
MFCS'99. LNCS
, vol.1672
-
-
Mosses, P.D.1
-
30
-
-
26844529721
-
Verifying a secure information flow analyzer. Theorem proving in higher order logics
-
TPHOLs'05, Oxford 2005 Springer, Heidelberg
-
Naumann DA (2005) Verifying a secure information flow analyzer. Theorem proving in higher order logics, TPHOLs'05, Oxford 2005. LNCS, vol 3603. Springer, Heidelberg
-
(2005)
LNCS
, vol.3603
-
-
Naumann, D.A.1
-
31
-
-
85084097858
-
Safe Kernel extensions without run-time checking
-
October 1996. Operating systems review, Special Issue, ACM, 1996 and USENIX Association, New York
-
Necula GC, Lee P (1996) Safe Kernel extensions without run-time checking. In: Proceedings of 2nd USENIX symposium on operating systems design and implementation (OSDI). October 1996. Operating systems review, Special Issue, ACM, 1996 and USENIX Association, New York, pp 229-243
-
(1996)
Proceedings of 2nd USENIX Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 229-243
-
-
Necula, G.C.1
Lee, P.2
-
32
-
-
84976711217
-
A Comparison of Pascal intermediate languages
-
8
-
Nelson PA (1979) A Comparison of Pascal intermediate languages. ACM SIGPLAN Notices 14(8):208-213
-
(1979)
ACM SIGPLAN Notices
, vol.14
, pp. 208-213
-
-
Nelson, P.A.1
-
34
-
-
35048854255
-
Information flow control revisited: Noninfluence = Noninterference + Nonleakage
-
9th European symposium on research in computer security, ESORICS'04 Springer, Heidelberg
-
Oheimb Dv (2004) Information flow control revisited: Noninfluence = Noninterference + Nonleakage. In: 9th European symposium on research in computer security, ESORICS'04. LNCS, vol 3193. Springer, Heidelberg
-
(2004)
LNCS
, vol.3193
-
-
Dv, O.1
-
35
-
-
0005042682
-
Machine-checking the Java language specification: Proving type-safety
-
Alves-Foss J (ed) Formal syntax and semantics of Java Springer, Heidelberg
-
Oheimb Dv, Nipkow T (1999) Machine-checking the Java language specification: proving type-safety. In: Alves-Foss J (ed) Formal syntax and semantics of Java. LNCS, vol 1523. Springer, Heidelberg, pp 119-156
-
(1999)
LNCS
, vol.1523
, pp. 119-156
-
-
Dv, O.1
Nipkow, T.2
-
38
-
-
0037251378
-
Language-based information-flow security
-
Sabelfeld A, Myers A (2003) Language-based information-flow security. Selected Areas Commun 21:5-19
-
(2003)
Selected Areas Commun
, vol.21
, pp. 5-19
-
-
Sabelfeld, A.1
Myers, A.2
-
40
-
-
0003539668
-
-
Springer Heidelberg
-
Stärk R, Schmid J, Börger E (2001) Java and the Java virtual machine: definition, verification, validation. Springer, Heidelberg
-
(2001)
Java and the Java Virtual Machine: Definition, Verification, Validation
-
-
Stärk, R.1
Schmid, J.2
Börger, E.3
-
43
-
-
33846519994
-
Types, bytes, and separation logic
-
Principles of programming languages, POPL'07 Association for Computing Machinery
-
Tuch H, Klein G, Norrish M (2007) Types, bytes, and separation logic. In: Principles of programming languages, POPL'07. ACM SIGPLAN 42(1), Association for Computing Machinery
-
(2007)
ACM SIGPLAN
, vol.42
, Issue.1
-
-
Tuch, H.1
Klein, G.2
Norrish, M.3
|