-
2
-
-
0001772130
-
Secrecy by typing in security protocols
-
Sept
-
M. Abadi. Secrecy by typing in security protocols. JACM, 46(5):749-786, Sept. 1999.
-
(1999)
JACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
3
-
-
23144463868
-
Analyzing security protocols with secrecy types and logic programs
-
M. Abadi and B. Blanchet. Analyzing security protocols with secrecy types and logic programs. JACM, 52(1):102-146, 2005.
-
(2005)
JACM
, vol.52
, Issue.1
, pp. 102-146
-
-
Abadi, M.1
Blanchet, B.2
-
5
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148:1-70, 1999.
-
(1999)
Information and Computation
, vol.148
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
7
-
-
0027667638
-
A calculus for access control in distributed systems
-
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A calculus for access control in distributed systems. ACMTOPLAS, 15(4):706-734, 1993.
-
(1993)
ACMTOPLAS
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
8
-
-
33749846305
-
Cryptographicallymasked flows
-
Static Analysis Symposium, of, Springer
-
A. Askarov, D. Hedin, and A. Sabelfeld. Cryptographicallymasked flows. In Static Analysis Symposium, volume 4134 of LNCS, pages 353-369. Springer, 2006.
-
(2006)
LNCS
, vol.4134
, pp. 353-369
-
-
Askarov, A.1
Hedin, D.2
Sabelfeld, A.3
-
9
-
-
0035817896
-
Subtyping dependent types
-
D. Aspinall and A. Compagnoni. Subtyping dependent types. TCS, 266(1-2):273-309, 2001.
-
(2001)
TCS
, vol.266
, Issue.1-2
, pp. 273-309
-
-
Aspinall, D.1
Compagnoni, A.2
-
10
-
-
19044390891
-
-
The Spec# programming system: An overview, Springer, January
-
M. Barnett, M. Leino, and W. Schulte. The Spec# programming system: An overview. In CASSIS'05, volume 3362 of LNCS, pages 49-69. Springer, January 2005.
-
(2005)
CASSIS'05, volume 3362 of LNCS
, pp. 49-69
-
-
Barnett, M.1
Leino, M.2
Schulte, W.3
-
11
-
-
51749099522
-
-
K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse. Verified interoperable implementations of security protocols. Technical Report MSR-TR-2006-46, Microsoft Research, 2007. See also CSFW'06 and WS-FM'06.
-
K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse. Verified interoperable implementations of security protocols. Technical Report MSR-TR-2006-46, Microsoft Research, 2007. See also CSFW'06 and WS-FM'06.
-
-
-
-
13
-
-
38649141810
-
Automated verification of selected equivalences for security protocols
-
B. Blanchet, M. Abadi, and C. Fournet. Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming, 75(1):3-51, 2008.
-
(2008)
Journal of Logic and Algebraic Programming
, vol.75
, Issue.1
, pp. 3-51
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
14
-
-
84974613879
-
Typechecking dependent types and subtypes
-
Foundations of Logic and Functional Programming, of, Springer
-
L. Cardelli. Typechecking dependent types and subtypes. In Foundations of Logic and Functional Programming, volume 306 of LNCS, pages 45-57. Springer, 1986.
-
(1986)
LNCS
, vol.306
, pp. 45-57
-
-
Cardelli, L.1
-
15
-
-
35048840249
-
-
Do As I SaY! Programmatic access control with explicit identities
-
A. Cirillo, R. Jagadeesan, C. Pitcher, and J. Riely. Do As I SaY! Programmatic access control with explicit identities. In IEEE Computer Security Foundations Symposium (CSF'07), pages 16-30, 2007.
-
(2007)
IEEE Computer Security Foundations Symposium (CSF'07)
, pp. 16-30
-
-
Cirillo, A.1
Jagadeesan, R.2
Pitcher, C.3
Riely, J.4
-
16
-
-
24144474987
-
ESC/Java2: Uniting ESC/Java and JML
-
CASSIS'05, of, Springer
-
D. R. Cok and J. Kiniry. ESC/Java2: Uniting ESC/Java and JML. In CASSIS'05, volume 3362 of LNCS, pages 108-128. Springer, 2004.
-
(2004)
LNCS
, vol.3362
, pp. 108-128
-
-
Cok, D.R.1
Kiniry, J.2
-
17
-
-
45749085681
-
Z3: An efficient SMT solver
-
Tools and Algorithms for the Construction and Analysis of Systems TACAC'08, of, Springer
-
L. de Moura and N. Bjørner. Z3: An efficient SMT solver. In Tools and Algorithms for the Construction and Analysis of Systems (TACAC'08), volume 4963 of LNCS, pages 337-340. Springer, 2008.
-
(2008)
LNCS
, vol.4963
, pp. 337-340
-
-
de Moura, L.1
Bjørner, N.2
-
18
-
-
24944448541
-
Simplify: A theorem prover for program checking
-
D. Detlefs, G. Nelson, and J. Saxe. Simplify: A theorem prover for program checking. JACM, 52(3):365-473, 2005.
-
(2005)
JACM
, vol.52
, Issue.3
, pp. 365-473
-
-
Detlefs, D.1
Nelson, G.2
Saxe, J.3
-
20
-
-
0038394738
-
-
Recommendation, at
-
D. Eastlake, J. Reagle, D. Solo, M. Bartel, J. Boyer, B. Fox, B. LaMacchia, and E. Simon. XML-Signature Syntax and Processing, 2002. W3C Recommendation, at http://www.w3.org/TR/2002/REC-xmldsig-core-20020212/.
-
(2002)
XML-Signature Syntax and Processing
-
-
Eastlake, D.1
Reagle, J.2
Solo, D.3
Bartel, M.4
Boyer, J.5
Fox, B.6
LaMacchia, B.7
Simon, E.8
-
22
-
-
0036036098
-
Extended static checking for Java
-
C. Flanagan, K. R. M. Leino, M. Lillibridge, G. Nelson, J. B. Saxe, and R. Stata. Extended static checking for Java. SIGPLAN Not., 37(5):234-245, 2002.
-
(2002)
SIGPLAN Not
, vol.37
, Issue.5
, pp. 234-245
-
-
Flanagan, C.1
Leino, K.R.M.2
Lillibridge, M.3
Nelson, G.4
Saxe, J.B.5
Stata, R.6
-
24
-
-
34548463070
-
-
C. Fournet, A. D. Gordon, and S. Maffeis. A type discipline for authorization policies. ACM TOPLAS, 29(5), 2007a. In press.
-
C. Fournet, A. D. Gordon, and S. Maffeis. A type discipline for authorization policies. ACM TOPLAS, 29(5), 2007a. In press.
-
-
-
-
27
-
-
51749115896
-
-
A. D. Gordon and A. S. A. Jeffrey. Cryptyc: Cryptographic protocol type checker. At http://cryptyc.cs.depaul.edu/, 2002.
-
A. D. Gordon and A. S. A. Jeffrey. Cryptyc: Cryptographic protocol type checker. At http://cryptyc.cs.depaul.edu/, 2002.
-
-
-
-
28
-
-
0141863341
-
Authenticity by typing for security protocols
-
A. D. Gordon and A. S. A. Jeffrey. Authenticity by typing for security protocols. Journal of Computer Security, 11(4):451-521, 2003a.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.4
, pp. 451-521
-
-
Gordon, A.D.1
Jeffrey, A.S.A.2
-
29
-
-
3042660681
-
Types and effects for asymmetric cryptographic protocols
-
A. D. Gordon and A. S. A. Jeffrey. Types and effects for asymmetric cryptographic protocols. Journal of Computer Security, 12(3/4):435-484, 2003b.
-
(2003)
Journal of Computer Security
, vol.12
, Issue.3-4
, pp. 435-484
-
-
Gordon, A.D.1
Jeffrey, A.S.A.2
-
30
-
-
24144470036
-
Cryptographic protocol analysis on real C code
-
J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real C code. In VMCAI'05, pages 363-379, 2005.
-
(2005)
VMCAI'05
, pp. 363-379
-
-
Goubault-Larrecq, J.1
Parrennes, F.2
-
31
-
-
51749100962
-
Sage: Hybrid checking for flexible specifications. In R. Findler, editor
-
J. Gronski, K. Knowles, A. Tomb, S. N. Freund, and C. Flanagan. Sage: Hybrid checking for flexible specifications. In R. Findler, editor, Scheme and Functional Programming Workshop, pages 93-104, 2006.
-
(2006)
Scheme and Functional Programming Workshop
, pp. 93-104
-
-
Gronski, J.1
Knowles, K.2
Tomb, A.3
Freund, S.N.4
Flanagan, C.5
-
33
-
-
24144433896
-
Implementing a formally verifiable security protocol in Java Card
-
E. Hubbers, M. Oostdijk, and E. Poll. Implementing a formally verifiable security protocol in Java Card. In Security in Pervasive Computing, pages 213-226, 2003.
-
(2003)
Security in Pervasive Computing
, pp. 213-226
-
-
Hubbers, E.1
Oostdijk, M.2
Poll, E.3
-
34
-
-
0015561577
-
Protection in programming languages
-
J. H. Morris, Jr. Protection in programming languages. Commun. ACM, 16(1):15-21, 1973.
-
(1973)
Commun. ACM
, vol.16
, Issue.1
, pp. 15-21
-
-
Morris Jr., J.H.1
-
37
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21(12):993-999, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
39
-
-
51749109735
-
Verifying an implementation of SSH
-
E. Poll and A. Schubert. Verifying an implementation of SSH. In WITS'07, pages 164-177, 2007.
-
(2007)
WITS'07
, pp. 164-177
-
-
Poll, E.1
Schubert, A.2
-
41
-
-
0348017041
-
Information flow inference for ML
-
F. Pottier and V. Simonet. Information flow inference for ML. ACM TOPLAS, 25(1):117-158, 2003.
-
(2003)
ACM TOPLAS
, vol.25
, Issue.1
, pp. 117-158
-
-
Pottier, F.1
Simonet, V.2
-
42
-
-
84945270736
-
A systematic approach to access control
-
Programming Languages and Systems ESOP 2001, of, Springer
-
F. Pottier, C. Skalka, and S. Smith. A systematic approach to access control. In Programming Languages and Systems (ESOP 2001), volume 2028 of LNCS, pages 30-45. Springer, 2001.
-
(2001)
LNCS
, vol.2028
, pp. 30-45
-
-
Pottier, F.1
Skalka, C.2
Smith, S.3
-
44
-
-
0013040655
-
Subtypes for specifications: Predicate subtyping in PVS
-
J. Rushby, S. Owre, and N. Shankar. Subtypes for specifications: Predicate subtyping in PVS. IEEE Transactions on Software Engineering, 24(9):709-720, 1998.
-
(1998)
IEEE Transactions on Software Engineering
, vol.24
, Issue.9
, pp. 709-720
-
-
Rushby, J.1
Owre, S.2
Shankar, N.3
-
45
-
-
0000307929
-
Reasoning about programs in continuation-passing style
-
A. Sabry and M. Felleisen. Reasoning about programs in continuation-passing style. LISP and Symbolic Computation, 6(3-4):289-360, 1993.
-
(1993)
LISP and Symbolic Computation
, vol.6
, Issue.3-4
, pp. 289-360
-
-
Sabry, A.1
Felleisen, M.2
-
46
-
-
34047126463
-
A bisimulation for dynamic sealing
-
Extended abstract at POPL'04
-
E. Sumii and B. Pierce. A bisimulation for dynamic sealing. TCS, 375(1-3):169-192, 2007. Extended abstract at POPL'04.
-
(2007)
TCS
, vol.375
, Issue.1-3
, pp. 169-192
-
-
Sumii, E.1
Pierce, B.2
-
48
-
-
34548790762
-
A cryptographic decentralized label model
-
Washington, DC, USA
-
J. A. Vaughan and S. Zdancewic. A cryptographic decentralized label model. In IEEE Symposium on Security and Privacy, pages 192-206, Washington, DC, USA, 2007.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 192-206
-
-
Vaughan, J.A.1
Zdancewic, S.2
|