메뉴 건너뛰기




Volumn 2028, Issue , 2001, Pages 62-76

Enforcing safety properties using type specialization

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 67650297709     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45309-1_5     Document Type: Conference Paper
Times cited : (6)

References (37)
  • 2
    • 0033686981 scopus 로고    scopus 로고
    • A semantics model of types and machine instructions for proof-carrying code
    • A. W. Appel and A. P. Felty. A semantics model of types and machine instructions for proof-carrying code. In Reps [29], pages 243-253.
    • In Reps , vol.29 , pp. 243-253
    • Appel, A.W.1    Felty, A.P.2
  • 4
    • 0033687342 scopus 로고    scopus 로고
    • Enforcing trace properties by program transformation
    • T. Colcombet and P. Fradet. Enforcing trace properties by program transformation. In Reps [29], pages 54-66.
    • In Reps , vol.29 , pp. 54-66
    • Colcombet, T.1    Fradet, P.2
  • 9
    • 84971961751 scopus 로고
    • On the generation of specializers
    • R. Glück. On the generation of specializers. Journal of Functional Programming, 4(4):499-514, Oct. 1994.
    • (1994) Journal of Functional Programming , vol.4 , Issue.4 , pp. 499-514
    • Glück, R.1
  • 12
    • 84882452873 scopus 로고    scopus 로고
    • Type specialisation for the ƛ-calculus; or, a new paradigm for partial evaluation based on type inference
    • O. Danvy, R. Gl¨uck, and P. Thiemann, editors, Schlo ß Dagstuhl, Germany, Springer-Verlag
    • J. Hughes. Type specialisation for the ƛ-calculus; or, a new paradigm for partial evaluation based on type inference. In O. Danvy, R. Gl¨uck, and P. Thiemann, editors, Partial Evaluation, volume 1110 of Lecture Notes in Computer Science, pages 183-215, Schlo ß Dagstuhl, Germany, Feb 1996. Springer-Verlag.
    • (1996) Partial Evaluation, Volume 1110 of Lecture Notes in Computer Science , pp. 183-215
    • Hughes, J.1
  • 14
    • 84945250016 scopus 로고    scopus 로고
    • Java2 platform
    • Java2 platform. http://www.javasoft.com/products/, 2000.
  • 15
  • 16
    • 0037479060 scopus 로고    scopus 로고
    • Language-based security. Technical Report TR99-1751, Cornell University
    • D. Kozen. Language-based security. Technical Report TR99-1751, Cornell University, Computer Science, June 15, 1999.
    • (1999) Computer Science , vol.15
    • Kozen, D.1
  • 18
  • 19
    • 0342652233 scopus 로고
    • Omniware: A universal substrate for web programming
    • S. Lucco, O. Sharp, and R. Wahbe. Omniware: A universal substrate for web programming. WorldWideWeb Journal, 1(1), Dec 1995.
    • (1995) Worldwideweb Journal , vol.1 , Issue.1
    • Lucco, S.1    Sharp, O.2    Wahbe, R.3
  • 25
    • 0001800257 scopus 로고    scopus 로고
    • Untrusted Agents Using Proof-Carrying Code
    • G. Vigna, editor, Springer-Verlag: Heidelberg, Germany
    • G. C. Necula and P. Lee. Safe, Untrusted Agents Using Proof-Carrying Code. In G. Vigna, editor, Mobile Agent Security, Lecture Notes in Computer Science No. 1419, pages 61-91. Springer-Verlag: Heidelberg, Germany, 1998.
    • (1998) Mobile Agent Security, Lecture Notes in Computer Science , vol.1419 , pp. 61-91
    • Necula, G.C.1    Safe, P.L.2
  • 26
    • 0005594251 scopus 로고
    • Programming with intersection types, union types, and polymorphism
    • CMU-CS-91-106, Carnegie Mellon University, Feb
    • B. Pierce. Programming with intersection types, union types, and polymorphism. Technical Report CMU-CS-91-106, Carnegie Mellon University, Feb. 1991.
    • (1991) Technical Report
    • Pierce, B.1
  • 30
    • 85035001592 scopus 로고
    • Definitional interpreters for higher-order programming languages
    • J. C. Reynolds. Definitional interpreters for higher-order programming languages. In ACM Annual Conference, pages 717-740, July 1972.
    • (1972) ACM Annual Conference , pp. 717-740
    • Reynolds, J.C.1
  • 31
    • 0003970441 scopus 로고    scopus 로고
    • Enforceable security policies
    • TR99-1759, Cornell University, Ithaca, NY, USA
    • F. B. Schneider. Enforceable security policies. Technical Report TR99-1759, Cornell University, Ithaca, NY, USA, July 1999.
    • (1999) Technical Report
    • Schneider, F.B.1
  • 32
    • 0012583201 scopus 로고    scopus 로고
    • Bootstrapping higher-order program transformers from interpreters
    • SAC (SAC '96), Philadelphia, PA, ACM
    • M. Sperber, R. Glück, and P. Thiemann. Bootstrapping higher-order program transformers from interpreters. In Proc. 11th Annual Symposium on Applied Computing, SAC (SAC '96), pages 408-413, Philadelphia, PA, Feb. 1996. ACM.
    • (1996) In Proc. 11Th Annual Symposium on Applied Computing , pp. 408-413
    • Sperber, M.1    Glück, R.2    Thiemann, P.3
  • 34
    • 84974250709 scopus 로고
    • Program tranformation with metasystem transitions
    • V. F. Turchin. Program tranformation with metasystem transitions. Journal of Functional Programming, 3(3):283-313, July 1993.
    • (1993) Journal of Functional Programming , vol.3 , Issue.3 , pp. 283-313
    • Turchin, V.F.1
  • 36
    • 0033726685 scopus 로고    scopus 로고
    • A type system for expressive security policies
    • D. Walker. A type system for expressive security policies. In Reps [29], pages 254-267.
    • In Reps , vol.29 , pp. 254-267
    • Walker, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.