메뉴 건너뛰기




Volumn 23, Issue 4, 2013, Pages 402-451

Secure distributed programming with value-dependent types

Author keywords

[No Author keywords available]

Indexed keywords

BYTECODE VERIFICATION; DESIGN AND IMPLEMENTATIONS; DISTRIBUTED APPLICATIONS; DISTRIBUTED PROGRAMMING; FUNCTIONAL LANGUAGES; LOGICAL CONSISTENCY; PRIVACY PRESERVING; PROGRAM VERIFICATION;

EID: 84888357190     PISSN: 09567968     EISSN: 14697653     Source Type: Journal    
DOI: 10.1017/S0956796813000142     Document Type: Conference Paper
Times cited : (34)

References (57)
  • 12
    • 0037175760 scopus 로고    scopus 로고
    • A linear logical framework
    • Cervesato, I. & Pfenning, F. (2002) A linear logical framework. Inf. Comput. 179(1), 19-75.
    • (2002) Inf. Comput. , vol.179 , Issue.1 , pp. 19-75
    • Cervesato, I.1    Pfenning, F.2
  • 13
    • 49449101262 scopus 로고    scopus 로고
    • Authorization in trust management: Features and foundations
    • doi: 10.1145/1380584.1380587
    • Chapin, P. C., Skalka, C. & Wang, X. S. (2008) Authorization in trust management: Features and foundations. ACM Comput. Surv. 40, doi: 10.1145/1380584.1380587.
    • (2008) ACM Comput. Surv. , vol.40
    • Chapin, P.C.1    Skalka, C.2    Wang, X.S.3
  • 14
    • 77954735651 scopus 로고    scopus 로고
    • Type-preserving compilation of end-to-end verification of security enforcement
    • ACM
    • Chen, J., Chugh, R. & Swamy, N. (2010) Type-preserving compilation of end-to-end verification of security enforcement. In Programming Language Design and Implementation. ACM, pp. 412-423.
    • (2010) Programming Language Design and Implementation , pp. 412-423
    • Chen, J.1    Chugh, R.2    Swamy, N.3
  • 19
    • 0034403161 scopus 로고    scopus 로고
    • A general formulation of simultaneous inductive-recursive definitions in type theory
    • Dybjer, P. (2000) A general formulation of simultaneous inductive-recursive definitions in type theory. J. Symb. Log. 65(2), 525-549.
    • (2000) J. Symb. Log. , vol.65 , Issue.2 , pp. 525-549
    • Dybjer, P.1
  • 20
    • 0026913084 scopus 로고
    • The revised report on the syntactic theories of sequential control and state
    • Felleisen,M. & Hieb, R. (1992) The revised report on the syntactic theories of sequential control and state. Theor. Comput. Sci. 103(2), 235-271.
    • (1992) Theor. Comput. Sci. , vol.103 , Issue.2 , pp. 235-271
    • Felleisen, M.1    Hieb, R.2
  • 27
    • 0141863341 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • Gordon, A. D. & Jeffrey, A. (2003) Authenticity by typing for security protocols. J. Comput. Secur. 11(4), 451-519.
    • (2003) J. Comput. Secur. , vol.11 , Issue.4 , pp. 451-519
    • Gordon, A.D.1    Jeffrey, A.2
  • 40
    • 0002891241 scopus 로고
    • Towards a mathematical science of computation
    • McCarthy, J. (1962) Towards a mathematical science of computation. In IFIP Congress. North- Holland, pp. 21-28.
    • (1962) IFIP Congress. North- Holland , pp. 21-28
    • McCarthy, J.1
  • 44
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Springer
    • Pedersen, T. P. (1992) Non-interactive and information-theoretic secure verifiable secret sharing. In Advances in Cryptology. Springer, pp. 129-140.
    • (1992) Advances in Cryptology , pp. 129-140
    • Pedersen, T.P.1
  • 48
    • 38049160746 scopus 로고    scopus 로고
    • Subset coercions in Coq
    • Springer
    • Sozeau, M. (2007) Subset coercions in Coq. In Types for Proofs and Programs. Springer, pp. 237-252.
    • (2007) Types for Proofs and Programs , pp. 237-252
    • Sozeau, M.1
  • 49
    • 77955240312 scopus 로고    scopus 로고
    • Equations: A dependent pattern-matching compiler
    • Springer
    • Sozeau, M. (2010). Equations: A dependent pattern-matching compiler. In Interactive Theorem Proving. Springer, pp. 419-434.
    • (2010) Interactive Theorem Proving , pp. 419-434
    • Sozeau, M.1
  • 52
    • 85040949627 scopus 로고    scopus 로고
    • Enforcing stateful authorization and information flow policies in Fine
    • Springer
    • Swamy, N., Chen, J. & Chugh, R. (2010) Enforcing stateful authorization and information flow policies in Fine. In European Symposium on Programming. Springer, pp. 529-549.
    • (2010) European Symposium on Programming , pp. 529-549
    • Swamy, N.1    Chen, J.2    Chugh, R.3
  • 54
    • 50249112702 scopus 로고    scopus 로고
    • Fable: A language for enforcing user-defined security policies
    • IEEE
    • Swamy, N., Corcoran, B. J. & Hicks,M. (2008) Fable: A language for enforcing user-defined security policies. In Security and Privacy. IEEE, pp. 369-383.
    • (2008) Security and Privacy , pp. 369-383
    • Swamy, N.1    Corcoran, B.J.2    Hicksm, M.3
  • 57
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Volpano, D., Smith, G. & Irvine, C. (1996) A sound type system for secure flow analysis. J. Comput. Secur. 4(3), 167-187.
    • (1996) J. Comput. Secur. , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.