-
2
-
-
34547567392
-
3: A linear language with locations
-
Typed Lambda Calculi and Applications 2005, Selected Papers
-
3: A linear language with locations. Fundamenta Informaticae, 77(4):397-449, 2007. (Pubitemid 47190513)
-
(2007)
Fundamenta Informaticae
, vol.77
, Issue.4
, pp. 397-449
-
-
Ahmed, A.1
Fluet, M.2
Morrisett, G.3
-
3
-
-
51749098783
-
Refinement types for secure implementations
-
J. Bengtson, K. Bhargavan, C. Fournet, A. D. Gordon, and S. Maffeis. Refinement types for secure implementations. In CSF, 2008.
-
(2008)
CSF
-
-
Bengtson, J.1
Bhargavan, K.2
Fournet, C.3
Gordon, A.D.4
Maffeis, S.5
-
4
-
-
42149126056
-
Modular typestate checking of aliased objects
-
K. Bierhoff and J. Aldrich. Modular typestate checking of aliased objects. OOPSLA, 2007.
-
(2007)
OOPSLA
-
-
Bierhoff, K.1
Aldrich, J.2
-
6
-
-
80054890279
-
Roles, stacks, histories: A triple for hoare
-
To appear
-
J. Borgström, A. Gordon, and R. Pucella. Roles, stacks, histories: A triple for Hoare. J. Funct. Program., 2010. To appear.
-
(2010)
J. Funct. Program.
-
-
Borgström, J.1
Gordon, A.2
Pucella, R.3
-
7
-
-
35248819194
-
Checking interference with fractional permissions
-
Springer
-
J. Boyland. Checking interference with fractional permissions. In SAS, pages 55-72. Springer, 2003.
-
(2003)
SAS
, pp. 55-72
-
-
Boyland, J.1
-
9
-
-
59249101046
-
Functional translation of a calculus of capabilities
-
A. Charguéraud and F. Pottier. Functional translation of a calculus of capabilities. In ICFP '08, 2008.
-
(2008)
ICFP '08
-
-
Charguéraud, A.1
Pottier, F.2
-
10
-
-
77954735651
-
Type-preserving compilation of end-to-end verification of security enforcement
-
ACM
-
J. Chen, R. Chugh, and N. Swamy. Type-preserving compilation of end-to-end verification of security enforcement. In PLDI '10. ACM, 2010.
-
(2010)
PLDI '10
-
-
Chen, J.1
Chugh, R.2
Swamy, N.3
-
11
-
-
70450181615
-
Effective interactive proofs for higher-order imperative programs
-
A. Chlipala, G. Malecha, G. Morrisett, A. Shinnar, and R. Wisnesky. Effective interactive proofs for higher-order imperative programs. In ICFP, 2009.
-
(2009)
ICFP
-
-
Chlipala, A.1
Malecha, G.2
Morrisett, G.3
Shinnar, A.4
Wisnesky, R.5
-
12
-
-
47249164288
-
Z3: An efficient SMT solver
-
L. de Moura and N. Bjorner. Z3: An efficient SMT solver. In TACAS, 2008.
-
(2008)
TACAS
-
-
De Moura, L.1
Bjorner, N.2
-
13
-
-
0036039550
-
Adoption and focus: Practical linear types for imperative programming
-
M. Fähndrich and R. DeLine. Adoption and focus: practical linear types for imperative programming. In PLDI, 2002.
-
(2002)
PLDI
-
-
Fähndrich, M.1
DeLine, R.2
-
15
-
-
33745822823
-
Hybrid type checking
-
C. Flanagan. Hybrid type checking. In POPL, 2006.
-
(2006)
POPL
-
-
Flanagan, C.1
-
17
-
-
38149001037
-
Hybrid types, invariants, and refinements for imperative objects
-
C. Flanagan, S. N. Freund, and A. Tomb. Hybrid types, invariants, and refinements for imperative objects. In FOOL/WOOD '06, 2006.
-
(2006)
FOOL/WOOD '06
-
-
Flanagan, C.1
Freund, S.N.2
Tomb, A.3
-
18
-
-
0000865197
-
Syntactic type abstraction
-
ISSN 0164-0925
-
D. Grossman, G. Morrisett, and S. Zdancewic. Syntactic type abstraction. ACM TOPLAS, 22(6):1037-1080, 2000. ISSN 0164-0925.
-
(2000)
ACM TOPLAS
, vol.22
, Issue.6
, pp. 1037-1080
-
-
Grossman, D.1
Morrisett, G.2
Zdancewic, S.3
-
19
-
-
0038507387
-
Alloy: A lightweight object modelling notation
-
D. Jackson. Alloy: a lightweight object modelling notation. TOSEM, 11(2), 2002.
-
(2002)
TOSEM
, vol.11
, Issue.2
-
-
Jackson, D.1
-
20
-
-
77954708621
-
The continue server
-
S. Krishnamurthi. The Continue server. In PADL, 2003.
-
(2003)
PADL
-
-
Krishnamurthi, S.1
-
21
-
-
67650035159
-
Design patterns in separation logic
-
N. R. Krishnaswami, J. Aldrich, L. Birkedal, K. Svendsen, and A. Buisse. Design patterns in separation logic. In TLDI, 2009.
-
(2009)
TLDI
-
-
Krishnaswami, N.R.1
Aldrich, J.2
Birkedal, L.3
Svendsen, K.4
Buisse, A.5
-
24
-
-
77954747980
-
LCF: A way of doing proofs with a machine
-
R. Milner. LCF: A way of doing proofs with a machine. In MFCS, 1979.
-
(1979)
MFCS
-
-
Milner, R.1
-
25
-
-
34247236249
-
Polymorphism and separation in hoare type theory
-
A. Nanevski, G. Morrisett, and L. Birkedal. Polymorphism and separation in Hoare type theory. In ICFP, 2006.
-
(2006)
ICFP
-
-
Nanevski, A.1
Morrisett, G.2
Birkedal, L.3
-
26
-
-
35448989750
-
Subset coercions in coq
-
Springer-Verlag
-
M. Sozeau. Subset coercions in Coq. In TYPES. Springer-Verlag, 2006.
-
(2006)
TYPES
-
-
Sozeau, M.1
-
28
-
-
77954739827
-
Enforcing stateful authorization and information flow policies in fine
-
N. Swamy, J. Chen, and R. Chugh. Enforcing stateful authorization and information flow policies in Fine. In ESOP, 2010a.
-
(2010)
ESOP
-
-
Swamy, N.1
Chen, J.2
Chugh, R.3
-
29
-
-
79952161645
-
Security programming with refinement types and mobile proofs
-
Microsoft Research
-
N. Swamy, J. Chen, C. Fournet, K. Bharagavan, and J. Yang. Security programming with refinement types and mobile proofs. Technical Report MSR-TR-2010-149, Microsoft Research, 2010b.
-
(2010)
Technical Report MSR-TR-2010-149
-
-
Swamy, N.1
Chen, J.2
Fournet, C.3
Bharagavan, K.4
Yang, J.5
-
30
-
-
79952173815
-
A hoare logic for the state monad
-
W. Swierstra. A Hoare logic for the state monad. In TPHOLs, 2009.
-
(2009)
TPHOLs
-
-
Swierstra, W.1
-
32
-
-
0000189545
-
Typed memory management via static capabilities
-
D. Walker, K. Crary, and G. Morrisett. Typed memory management via static capabilities. ACM TOPLAS, 22(4), 2000.
-
(2000)
ACM TOPLAS
, vol.22
, Issue.4
-
-
Walker, D.1
Crary, K.2
Morrisett, G.3
-
33
-
-
33646166707
-
Safe programming with pointers through stateful views
-
D. Zhu and H. Xi. Safe programming with pointers through stateful views. In PADL, 2005.
-
(2005)
PADL
-
-
Zhu, D.1
Xi, H.2
|