-
2
-
-
34247276117
-
Access control in a core calculus of dependency
-
Portland, Oregon, USA, September 16-21, ACM
-
Mart́in Abadi. Access control in a core calculus of dependency. In Proceedings of the 11th ACM SIGPLAN International Conference on Functional Programming, ICFP 2006, Portland, Oregon, USA, September 16-21, 2006, pages 263-273. ACM, 2006.
-
(2006)
Proceedings of the 11th ACM SIGPLAN International Conference on Functional Programming, ICFP 2006
, pp. 263-273
-
-
Abadi, M.1
-
4
-
-
0032681509
-
A core calculus of dependency
-
San Antonio, TX, January
-
Mart́in Abadi, Anindya Banerjee, Nevin Heintze, and Jon Riecke. A core calculus of dependency. In Proc. 26th ACM Symp. on Principles of Programming Languages (POPL), pages 147-160, San Antonio, TX, January 1999.
-
(1999)
Proc. 26th ACM Symp. on Principles of Programming Languages (POPL)
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.4
-
5
-
-
0027667638
-
A calculus for access control in distributed systems
-
September
-
Mart́in Abadi, Michael Burrows, Butler W. Lampson, and Gordon D. Plotkin. A calculus for access control in distributed systems. Transactions on Programming Languages and Systems, 15(4):706-734, September 1993.
-
(1993)
Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.W.3
Plotkin, G.D.4
-
6
-
-
0033281265
-
Proof-carrying authentication
-
New York, NY, USA, ACM
-
Andrew W. Appel and Edward W. Felten. Proof-carrying authentication. In CCS '99: Proceedings of the 6th ACM conference on Computer and communications security, pages 52-62, New York, NY, USA, 1999. ACM.
-
(1999)
CCS '99: Proceedings of the 6th ACM conference on Computer and communications security
, pp. 52-62
-
-
Appel, A.W.1
Felten, E.W.2
-
7
-
-
34548773746
-
Cryptographically masked information flows
-
Proceedings of the International Static Analysis Symposium, Seoul, Korea, August
-
Aslan Askarov, Daniel Hedin, and Andrei Sabelfeld. Cryptographically masked information flows. In Proceedings of the International Static Analysis Symposium, LNCS, Seoul, Korea, August 2006.
-
(2006)
LNCS
-
-
Askarov, A.1
Hedin, D.2
Sabelfeld, A.3
-
9
-
-
84865652525
-
-
Brian E. Aydemir, Arthur Charguéraud, Benjamin C. Pierce, Randy Pollack, and Stephanie Weirich. Engineering formal metatheory. In Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, San Francisco, California, USA, January 7-12, 2008, pages 3-15. ACM, 2008. 37
-
Brian E. Aydemir, Arthur Charguéraud, Benjamin C. Pierce, Randy Pollack, and Stephanie Weirich. Engineering formal metatheory. In Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, San Francisco, California, USA, January 7-12, 2008, pages 3-15. ACM, 2008. 37
-
-
-
-
10
-
-
0001439401
-
Lambda calculi with types
-
Samson Abramsky, Dov M. Gabbay, and Thomas S. E. Maibaum, editors, Clarendon Press, Oxford
-
Henk P. Barendregt. Lambda calculi with types. In Samson Abramsky, Dov M. Gabbay, and Thomas S. E. Maibaum, editors, Handbook of Logic in Computer Science, volume 2, pages 117-309. Clarendon Press, Oxford, 1992.
-
(1992)
Handbook of Logic in Computer Science
, vol.2
, pp. 117-309
-
-
Barendregt, H.P.1
-
11
-
-
33645995393
-
Device-enabled authorization in the Grey system
-
September
-
Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, and Peter Rutenbar. Device-enabled authorization in the Grey system. In Information Security: 8th International Conference, ISC 2005, pages 431-445, September 2005.
-
(2005)
Information Security: 8th International Conference, ISC
, pp. 431-445
-
-
Bauer, L.1
Garriss, S.2
McCune, J.M.3
Reiter, M.K.4
Rouse, J.5
Rutenbar, P.6
-
12
-
-
0346236349
-
-
Art and Science. Addison-Wesley Professional
-
Matt Bishop. Computer Security: Art and Science. Addison-Wesley Professional, 2002.
-
(2002)
Computer Security
-
-
Bishop, M.1
-
13
-
-
84957800809
-
KeyNote: Trust management for public-key infrastructures (position paper)
-
Matt Blaze, Joan Feigenbaum, and Angelos D. Keromytis. KeyNote: Trust management for public-key infrastructures (position paper). Lecture Notes in Computer Science, 1550:59-63, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1550
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
14
-
-
33745005053
-
An audit logic for accountability
-
J.G. Cederquist, R. Corin, M.A.C. Dekker, S. Etalle, and J.I. den Hartog. An audit logic for accountability. In The Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks, 2005.
-
(2005)
The Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks
-
-
Cederquist, J.G.1
Corin, R.2
Dekker, M.A.C.3
Etalle, S.4
den Hartog, J.I.5
-
15
-
-
84942244044
-
Type based distributed access control
-
Asilomar, Ca, USA, July
-
Tom Chothia, Dominic Duggan, and Jan Vitek. Type based distributed access control. In Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW'03), Asilomar, Ca., USA, July 2003.
-
(2003)
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW'03)
-
-
Chothia, T.1
Duggan, D.2
Vitek, J.3
-
16
-
-
0001470602
-
REFEREE: Trust management for web applications
-
Yang-Hua Chu, Joan Feigenbaum, Brian LaMacchia, Paul Resnick, and Martin Strauss. REFEREE: Trust management for web applications. Computer Networks and ISDN Systems, 29:953-964, 1997.
-
(1997)
Computer Networks and ISDN Systems
, vol.29
, pp. 953-964
-
-
Chu, Y.-H.1
Feigenbaum, J.2
LaMacchia, B.3
Resnick, P.4
Strauss, M.5
-
19
-
-
67650063772
-
-
North-Holland, Amsterdam
-
Haskell B. Curry, Robert Feys, and William Craig. Combinatory Logic, volume 1. North-Holland, Amsterdam, 1958.
-
(1958)
Combinatory Logic
, vol.1
-
-
Curry, H.B.1
Feys, R.2
Craig, W.3
-
21
-
-
24644447402
-
A type discipline for authorization policies
-
Proc. of the 14th European Symposium on Programming, of, Edinburgh, Scotland, April, Springer-Verlag
-
Cédric Fournet, Andrew D. Gordon, and Sergio Maffeis. A type discipline for authorization policies. In Proc. of the 14th European Symposium on Programming, volume 3444 of LNCS, pages 141-156, Edinburgh, Scotland, April 2005. Springer-Verlag.
-
(2005)
LNCS
, vol.3444
, pp. 141-156
-
-
Fournet, C.1
Gordon, A.D.2
Maffeis, S.3
-
22
-
-
35048817499
-
A type discipline for authorization in distributed systems
-
Venice, Italy, July
-
Cédric Fournet, Andrew D. Gordon, and Sergio Maffeis. A type discipline for authorization in distributed systems. In Proc. of the 20th IEEE Computer Security Foundations Symposium, pages 31-48, Venice, Italy, July 2007.
-
(2007)
Proc. of the 20th IEEE Computer Security Foundations Symposium
, pp. 31-48
-
-
Fournet, C.1
Gordon, A.D.2
Maffeis, S.3
-
24
-
-
0002386430
-
The formulae-as-types notion of construction
-
J. P. Seldin and J. R. Hindly, editors, Academic Press, New York
-
W. A. Howard. The formulae-as-types notion of construction. In J. P. Seldin and J. R. Hindly, editors, To H. B. Curry: Essays on Combinatory Logic, Lambda-Calculus, and Formalism, pages 479-490. Academic Press, New York, 1980.
-
(1980)
To H. B. Curry: Essays on Combinatory Logic, Lambda-Calculus, and Formalism
, pp. 479-490
-
-
Howard, W.A.1
-
25
-
-
67650068459
-
-
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianzhou Zhao, Luke Zarko, Joseph Schorr, and Steve Zdancewic. Aura: A programming language for authorization and audit, preliminary technical results. Technical Report MS-CIS-08-10, U. Pennsylvania, 2008.
-
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianzhou Zhao, Luke Zarko, Joseph Schorr, and Steve Zdancewic. Aura: A programming language for authorization and audit, preliminary technical results. Technical Report MS-CIS-08-10, U. Pennsylvania, 2008.
-
-
-
-
27
-
-
84865660260
-
On the computational soundness of cryptographically masked flows
-
Peeter Laud. On the computational soundness of cryptographically masked flows. SIGPLAN Not., 43(1):337-348, 2008.
-
(2008)
SIGPLAN Not
, vol.43
, Issue.1
, pp. 337-348
-
-
Laud, P.1
-
28
-
-
26844509701
-
A type system for computationally secure information flow
-
Lübeck, Germany
-
Peeter Laud and Varmo Vene. A type system for computationally secure information flow. In Proceedings of the 15th International Symposium on Fundamentals of Computational Theory, volume 3623, pages 365-377, Lübeck, Germany, 2005.
-
(2005)
Proceedings of the 15th International Symposium on Fundamentals of Computational Theory
, vol.3623
, pp. 365-377
-
-
Laud, P.1
Vene, V.2
-
33
-
-
84869374928
-
-
Ulf Norell. Towards a practical programming language based on dependent type theory. PhD thesis, Department of Computer Science and Engineering, Chalmers University of Technology, SE-412 96 Göteborg, Sweden, September 2007.
-
Ulf Norell. Towards a practical programming language based on dependent type theory. PhD thesis, Department of Computer Science and Engineering, Chalmers University of Technology, SE-412 96 Göteborg, Sweden, September 2007.
-
-
-
-
34
-
-
34247281139
-
Simple unification-based type inference for GADTs
-
New York, NY, USA, ACM Press
-
Simon Peyton Jones, Dimitrios Vytiniotis, Stephanie Weirich, and Geoffrey Washburn. Simple unification-based type inference for GADTs. In ICFP '06: Proceedings of the Eleventh ACM SIGPLAN International Conference on Functional Programming, pages 50-61, New York, NY, USA, 2006. ACM Press.
-
(2006)
ICFP '06: Proceedings of the Eleventh ACM SIGPLAN International Conference on Functional Programming
, pp. 50-61
-
-
Peyton Jones, S.1
Vytiniotis, D.2
Weirich, S.3
Washburn, G.4
-
37
-
-
34548310375
-
System F with type equality coercions
-
New York, NY, USA, ACM
-
Martin Sulzmann, Manuel M. T. Chakravarty, Simon Peyton Jones, and Kevin Donnelly. System F with type equality coercions. In TLDI '07: Proceedings of the 2007 ACM SIGPLAN international workshop on Types in languages design and implementation, pages 53-66, New York, NY, USA, 2007. ACM.
-
(2007)
TLDI '07: Proceedings of the 2007 ACM SIGPLAN international workshop on Types in languages design and implementation
, pp. 53-66
-
-
Sulzmann, M.1
Chakravarty, M.M.T.2
Peyton Jones, S.3
Donnelly, K.4
-
40
-
-
51749116017
-
-
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, and Steve Zdancewic. Evidence-based audit. In Proc. of the IEEE Computer Security Foundations Symposium, 2008. Extended version available as U. Pennsylvania Technical Report MS-CIS-08-09.
-
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, and Steve Zdancewic. Evidence-based audit. In Proc. of the IEEE Computer Security Foundations Symposium, 2008. Extended version available as U. Pennsylvania Technical Report MS-CIS-08-09.
-
-
-
-
41
-
-
34548790762
-
A cryptographic decentralized label model
-
Berkeley, California
-
Jeffrey A. Vaughan and Steve Zdancewic. A cryptographic decentralized label model. In IEEE Symposium on Security and Privacy, pages 192-206, Berkeley, California, 2007.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 192-206
-
-
Vaughan, J.A.1
Zdancewic, S.2
-
42
-
-
67650068457
-
-
Philip Wadler. Monads for functional programming. In J. Jeuring and E. Meijer, editors, Advanced Functional Programming, 925 of LNCS. Springer Verlag, 1995. Some errata fixed August 2001.
-
Philip Wadler. Monads for functional programming. In J. Jeuring and E. Meijer, editors, Advanced Functional Programming, volume 925 of LNCS. Springer Verlag, 1995. Some errata fixed August 2001.
-
-
-
-
44
-
-
34249798225
-
A language-based approach to functionally correct imperative programming
-
B. Pierce, editor, Tallinn, Estonia
-
E. Westbrook, A. Stump, and I. Wehrman. A language-based approach to functionally correct imperative programming. In B. Pierce, editor, 10th ACM SIGPLAN International Conference on Functional Programming, Tallinn, Estonia, 2005.
-
(2005)
10th ACM SIGPLAN International Conference on Functional Programming
-
-
Westbrook, E.1
Stump, A.2
Wehrman, I.3
-
45
-
-
0028380781
-
Authentication in the Taos operating system
-
Edward Wobber, Mart́in Abadi, Michael Burrows, and Butler Lampson. Authentication in the Taos operating system. ACM Trans. Comput. Syst., 12(1):3-32, 1994.
-
(1994)
ACM Trans. Comput. Syst
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
-
46
-
-
35048858250
-
Applied Type System (extended abstract)
-
postworkshop Proceedings of TYPES, Springer-Verlag
-
Hongwei Xi. Applied Type System (extended abstract). In postworkshop Proceedings of TYPES 2003, pages 394-408. Springer-Verlag LNCS 3085, 2004.
-
(2003)
LNCS
, vol.3085
, pp. 394-408
-
-
Xi, H.1
|