-
1
-
-
77950852652
-
Distributed programming with distributed authorization
-
K. Avijit, A. Datta, and R. Harper. Distributed programming with distributed authorization. In TLDI, 2010.
-
(2010)
TLDI
-
-
Avijit, K.1
Datta, A.2
Harper, R.3
-
3
-
-
51749098783
-
Refinement types for secure implementations
-
J. Bengtson, K. Bhargavan, C. Fournet, A. D. Gordon, and S. Maffeis. Refinement types for secure implementations. In CSF, 2008.
-
(2008)
CSF
-
-
Bengtson, J.1
Bhargavan, K.2
Fournet, C.3
Gordon, A.D.4
Maffeis, S.5
-
5
-
-
70350548000
-
Cryptographic protocol synthesis and verification for multiparty sessions
-
K. Bhargavan, R. Corin, P.-M. Dénielou, C. Fournet, and J. Leifer. Cryptographic protocol synthesis and verification for multiparty sessions. In CSF, 2009.
-
(2009)
CSF
-
-
Bhargavan, K.1
Corin, R.2
Dénielou, P.-M.3
Fournet, C.4
Leifer, J.5
-
6
-
-
77950909049
-
Modular verification of security protocol code by typing
-
K. Bhargavan, C. Fournet, and A. D. Gordon. Modular verification of security protocol code by typing. In POPL, 2010.
-
(2010)
POPL
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
7
-
-
79952125780
-
Verifying stateful programs with substructural state and hoare types
-
Jan
-
J. Borgstrom, J. Chen, and N. Swamy. Verifying stateful programs with substructural state and hoare types. In PLPV '11, Jan. 2011.
-
(2011)
PLPV '11
-
-
Borgstrom, J.1
Chen, J.2
Swamy, N.3
-
9
-
-
49449101262
-
Authorization in trust management: Features and foundations
-
P. C. Chapin, C. Skalka, and X. S. Wang. Authorization in trust management: Features and foundations. ACM Comput. Surv., 40, 2008.
-
(2008)
ACM Comput. Surv.
, vol.40
-
-
Chapin, P.C.1
Skalka, C.2
Wang, X.S.3
-
10
-
-
77954735651
-
Type-preserving compilation of end-toend verification of security enforcement
-
ACM
-
J. Chen, R. Chugh, and N. Swamy. Type-preserving compilation of end-toend verification of security enforcement. In PLDI '10. ACM, 2010.
-
(2010)
PLDI '10
-
-
Chen, J.1
Chugh, R.2
Swamy, N.3
-
11
-
-
47249164288
-
Z3: An efficient SMT solver
-
L. de Moura and N. Bjørner. Z3: An efficient SMT solver. In TACAS, 2008.
-
(2008)
TACAS
-
-
De Moura, L.1
Bjørner, N.2
-
12
-
-
79951662554
-
Dynamic multirole session types
-
P.-M. Deniélou and N. Yoshida. Dynamic multirole session types. In POPL, 2011.
-
(2011)
POPL
-
-
Deniélou, P.-M.1
Yoshida, N.2
-
14
-
-
0141863341
-
Authenticity by typing for security protocols
-
A. D. Gordon and A. Jeffrey. Authenticity by typing for security protocols. Journal of Computer Security, 11(4):451-520, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.4
, pp. 451-520
-
-
Gordon, A.D.1
Jeffrey, A.2
-
17
-
-
84865647368
-
Multiparty asynchronous session types
-
K. Honda, N. Yoshida, and M. Carbone. Multiparty asynchronous session types. In POPL, 2008.
-
(2008)
POPL
-
-
Honda, K.1
Yoshida, N.2
Carbone, M.3
-
18
-
-
70450285315
-
Encoding information flow in aura
-
L. Jia and S. Zdancewic. Encoding information flow in aura. In PLAS, 2009.
-
(2009)
PLAS
-
-
Jia, L.1
Zdancewic, S.2
-
19
-
-
59249096370
-
Aura: A programming language for authorization and audit
-
L. Jia, J. Vaughan, K. Mazurak, J. Zhao, L. Zarko, J. Schorr, and S. Zdancewic. Aura: A programming language for authorization and audit. In ICFP, 2008.
-
(2008)
ICFP
-
-
Jia, L.1
Vaughan, J.2
Mazurak, K.3
Zhao, J.4
Zarko, L.5
Schorr, J.6
Zdancewic, S.7
-
22
-
-
70149084051
-
Towards a practical programming language based on dependent type theory
-
PhD thesis
-
U. Norell. Towards a practical programming language based on dependent type theory. PhD thesis, Chalmers Institute of Technology, 2007.
-
(2007)
Chalmers Institute of Technology
-
-
Norell, U.1
-
24
-
-
77951122326
-
Ott: Effective tool support for the working semanticist
-
P. Sewell, F. Z. Nardelli, S. Owens, G. Peskine, T. Ridge, S. Sarkar, and R. Strnisa. Ott: Effective tool support for the working semanticist. JFP, 20(1), 2010.
-
(2010)
JFP
, vol.20
, Issue.1
-
-
Sewell, P.1
Nardelli, F.Z.2
Owens, S.3
Peskine, G.4
Ridge, T.5
Sarkar, S.6
Strnisa, R.7
-
25
-
-
35448989750
-
Subset coercions in coq
-
M. Sozeau. Subset coercions in coq. In TYPES, 2007.
-
(2007)
TYPES
-
-
Sozeau, M.1
-
26
-
-
50249112702
-
Fable: A language for enforcing user-defined security policies
-
N. Swamy, B. J. Corcoran, and M. Hicks. Fable: A language for enforcing user-defined security policies. In S&P, 2008.
-
(2008)
S&P
-
-
Swamy, N.1
Corcoran, B.J.2
Hicks, M.3
-
27
-
-
77954739827
-
Enforcing stateful authorization and information flow policies in Fine
-
N. Swamy, J. Chen, and R. Chugh. Enforcing stateful authorization and information flow policies in Fine. In ESOP, 2010.
-
(2010)
ESOP
-
-
Swamy, N.1
Chen, J.2
Chugh, R.3
-
28
-
-
80053379878
-
-
The Coq Development Team. Technical report
-
The Coq Development Team. Chapter 4: Calculus of Inductive Constructions. Technical report, 2010. URL http://coq.inria.fr.
-
(2010)
Chapter 4: Calculus of Inductive Constructions
-
-
-
30
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|