메뉴 건너뛰기




Volumn 46, Issue 9, 2011, Pages 266-278

Secure distributed programming with value-dependent types

Author keywords

Refinement types; Security type systems

Indexed keywords

BYTECODE VERIFICATION; BYTECODES; CODE SIZE; DISTRIBUTED APPLICATIONS; DISTRIBUTED PROGRAMMING; FUNCTIONAL LANGUAGES; LOGICAL CONSISTENCY; MODULAR REASONING; MULTI-TIER; PAYMENT PROTOCOL; PRIVACY PRESERVING; PROGRAM VERIFICATION; RECURSIONS; REFERENCE MONITORS; REFINEMENT TYPES; SECURITY TYPE SYSTEMS; WEB APPLICATION; ZERO KNOWLEDGE;

EID: 80053344480     PISSN: 15232867     EISSN: None     Source Type: Journal    
DOI: 10.1145/2034574.2034811     Document Type: Conference Paper
Times cited : (43)

References (30)
  • 1
    • 77950852652 scopus 로고    scopus 로고
    • Distributed programming with distributed authorization
    • K. Avijit, A. Datta, and R. Harper. Distributed programming with distributed authorization. In TLDI, 2010.
    • (2010) TLDI
    • Avijit, K.1    Datta, A.2    Harper, R.3
  • 5
    • 70350548000 scopus 로고    scopus 로고
    • Cryptographic protocol synthesis and verification for multiparty sessions
    • K. Bhargavan, R. Corin, P.-M. Dénielou, C. Fournet, and J. Leifer. Cryptographic protocol synthesis and verification for multiparty sessions. In CSF, 2009.
    • (2009) CSF
    • Bhargavan, K.1    Corin, R.2    Dénielou, P.-M.3    Fournet, C.4    Leifer, J.5
  • 6
    • 77950909049 scopus 로고    scopus 로고
    • Modular verification of security protocol code by typing
    • K. Bhargavan, C. Fournet, and A. D. Gordon. Modular verification of security protocol code by typing. In POPL, 2010.
    • (2010) POPL
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3
  • 7
    • 79952125780 scopus 로고    scopus 로고
    • Verifying stateful programs with substructural state and hoare types
    • Jan
    • J. Borgstrom, J. Chen, and N. Swamy. Verifying stateful programs with substructural state and hoare types. In PLPV '11, Jan. 2011.
    • (2011) PLPV '11
    • Borgstrom, J.1    Chen, J.2    Swamy, N.3
  • 8
    • 0037175760 scopus 로고    scopus 로고
    • A linear logical framework
    • I. Cervesato and F. Pfenning. A linear logical framework. Inf. Comput., 179 (1), 2002.
    • (2002) Inf. Comput. , vol.179 , Issue.1
    • Cervesato, I.1    Pfenning, F.2
  • 9
    • 49449101262 scopus 로고    scopus 로고
    • Authorization in trust management: Features and foundations
    • P. C. Chapin, C. Skalka, and X. S. Wang. Authorization in trust management: Features and foundations. ACM Comput. Surv., 40, 2008.
    • (2008) ACM Comput. Surv. , vol.40
    • Chapin, P.C.1    Skalka, C.2    Wang, X.S.3
  • 10
    • 77954735651 scopus 로고    scopus 로고
    • Type-preserving compilation of end-toend verification of security enforcement
    • ACM
    • J. Chen, R. Chugh, and N. Swamy. Type-preserving compilation of end-toend verification of security enforcement. In PLDI '10. ACM, 2010.
    • (2010) PLDI '10
    • Chen, J.1    Chugh, R.2    Swamy, N.3
  • 11
    • 47249164288 scopus 로고    scopus 로고
    • Z3: An efficient SMT solver
    • L. de Moura and N. Bjørner. Z3: An efficient SMT solver. In TACAS, 2008.
    • (2008) TACAS
    • De Moura, L.1    Bjørner, N.2
  • 12
    • 79951662554 scopus 로고    scopus 로고
    • Dynamic multirole session types
    • P.-M. Deniélou and N. Yoshida. Dynamic multirole session types. In POPL, 2011.
    • (2011) POPL
    • Deniélou, P.-M.1    Yoshida, N.2
  • 14
    • 0141863341 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • A. D. Gordon and A. Jeffrey. Authenticity by typing for security protocols. Journal of Computer Security, 11(4):451-520, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.4 , pp. 451-520
    • Gordon, A.D.1    Jeffrey, A.2
  • 16
    • 80053346790 scopus 로고    scopus 로고
    • Reliable evidence: Auditability by typing
    • N. Guts, C. Fournet, and F. Z. Nardelli. Reliable evidence: Auditability by typing. In ESORICS, 2009.
    • (2009) ESORICS
    • Guts, N.1    Fournet, C.2    Nardelli, F.Z.3
  • 17
    • 84865647368 scopus 로고    scopus 로고
    • Multiparty asynchronous session types
    • K. Honda, N. Yoshida, and M. Carbone. Multiparty asynchronous session types. In POPL, 2008.
    • (2008) POPL
    • Honda, K.1    Yoshida, N.2    Carbone, M.3
  • 18
    • 70450285315 scopus 로고    scopus 로고
    • Encoding information flow in aura
    • L. Jia and S. Zdancewic. Encoding information flow in aura. In PLAS, 2009.
    • (2009) PLAS
    • Jia, L.1    Zdancewic, S.2
  • 22
    • 70149084051 scopus 로고    scopus 로고
    • Towards a practical programming language based on dependent type theory
    • PhD thesis
    • U. Norell. Towards a practical programming language based on dependent type theory. PhD thesis, Chalmers Institute of Technology, 2007.
    • (2007) Chalmers Institute of Technology
    • Norell, U.1
  • 25
    • 35448989750 scopus 로고    scopus 로고
    • Subset coercions in coq
    • M. Sozeau. Subset coercions in coq. In TYPES, 2007.
    • (2007) TYPES
    • Sozeau, M.1
  • 26
    • 50249112702 scopus 로고    scopus 로고
    • Fable: A language for enforcing user-defined security policies
    • N. Swamy, B. J. Corcoran, and M. Hicks. Fable: A language for enforcing user-defined security policies. In S&P, 2008.
    • (2008) S&P
    • Swamy, N.1    Corcoran, B.J.2    Hicks, M.3
  • 27
    • 77954739827 scopus 로고    scopus 로고
    • Enforcing stateful authorization and information flow policies in Fine
    • N. Swamy, J. Chen, and R. Chugh. Enforcing stateful authorization and information flow policies in Fine. In ESOP, 2010.
    • (2010) ESOP
    • Swamy, N.1    Chen, J.2    Chugh, R.3
  • 28


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.