-
4
-
-
0001439401
-
Lambda Calculi with types
-
Abramsky, S., Gabbay, D.M. Maibaum, T. S. E. (eds). Oxford: Oxford University Press
-
Barendregt, H., Abramsky, S., Gabbay, D. M.,Maibaum, T. S. E. & Barendregt, H. P. (1992) Lambda Calculi with types. Handbook of Logic in Computer Science, Abramsky, S., Gabbay, D. M., Maibaum, T. S. E. (eds). Oxford: Oxford University Press, pp. 117-309.
-
(1992)
Handbook of Logic in Computer Science
, pp. 117-309
-
-
Barendregt, H.1
Abramsky, S.2
Gabbay, D.M.3
Maibaum, T.S.E.4
Barendregt, H.P.5
-
5
-
-
84888370277
-
-
Tech. Rept. MSR-TR-2012-37. Microsoft Research
-
Barthe, G., Fournet, C., Gregoire, B., Strub, P.-Y., Swamy, N. & Beguelin, S. Z. (2012) Probabilistic Relational Verification for Cryptographic Implementations. Tech. Rept. MSR-TR-2012-37. Microsoft Research.
-
(2012)
Probabilistic Relational Verification for Cryptographic Implementations
-
-
Barthe, G.1
Fournet, C.2
Gregoire, B.3
Strub, P.-Y.4
Swamy, N.5
Beguelin, S.Z.6
-
6
-
-
33845209418
-
CIĈ: Type-based termination of recursive definitions in the calculus of inductive constructions
-
ACM
-
Barthe, G., Grëgoire, B. & Pastawski, F. (2006) CIĈ: Type-based termination of recursive definitions in the calculus of inductive constructions. In Logic for Programming, Artificial Intelligence, and Reasoning. ACM, pp. 257-271.
-
(2006)
Logic for Programming, Artificial Intelligence, and Reasoning
, pp. 257-271
-
-
Barthe, G.1
Grëgoire, B.2
Pastawski, F.3
-
7
-
-
51749098783
-
Refinement types for secure implementations
-
IEEE
-
Bengtson, J., Bhargavan, K., Fournet, C., Gordon, A. D. & Maffeis, S. (2008) Refinement types for secure implementations. In Computer Security Foundations Symposium. IEEE, pp. 17-32.
-
(2008)
Computer Security Foundations Symposium
, pp. 17-32
-
-
Bengtson, J.1
Bhargavan, K.2
Fournet, C.3
Gordon, A.D.4
Maffeis, S.5
-
9
-
-
70350548000
-
Cryptographic protocol synthesis and verification for multiparty sessions
-
IEEE
-
Bhargavan, K., Corin, R., Dëtnielou, P.-M., Fournet, C. & Leifer, J. (2009) Cryptographic protocol synthesis and verification for multiparty sessions. In Computer Security Foundations Symposium. IEEE, pp. 124-140.
-
(2009)
Computer Security Foundations Symposium
, pp. 124-140
-
-
Bhargavan, K.1
Corin, R.2
Dëtnielou, P.-M.3
Fournet, C.4
Leifer, J.5
-
12
-
-
0037175760
-
A linear logical framework
-
Cervesato, I. & Pfenning, F. (2002) A linear logical framework. Inf. Comput. 179(1), 19-75.
-
(2002)
Inf. Comput.
, vol.179
, Issue.1
, pp. 19-75
-
-
Cervesato, I.1
Pfenning, F.2
-
13
-
-
49449101262
-
Authorization in trust management: Features and foundations
-
doi: 10.1145/1380584.1380587
-
Chapin, P. C., Skalka, C. & Wang, X. S. (2008) Authorization in trust management: Features and foundations. ACM Comput. Surv. 40, doi: 10.1145/1380584.1380587.
-
(2008)
ACM Comput. Surv.
, vol.40
-
-
Chapin, P.C.1
Skalka, C.2
Wang, X.S.3
-
14
-
-
77954735651
-
Type-preserving compilation of end-to-end verification of security enforcement
-
ACM
-
Chen, J., Chugh, R. & Swamy, N. (2010) Type-preserving compilation of end-to-end verification of security enforcement. In Programming Language Design and Implementation. ACM, pp. 412-423.
-
(2010)
Programming Language Design and Implementation
, pp. 412-423
-
-
Chen, J.1
Chugh, R.2
Swamy, N.3
-
19
-
-
0034403161
-
A general formulation of simultaneous inductive-recursive definitions in type theory
-
Dybjer, P. (2000) A general formulation of simultaneous inductive-recursive definitions in type theory. J. Symb. Log. 65(2), 525-549.
-
(2000)
J. Symb. Log.
, vol.65
, Issue.2
, pp. 525-549
-
-
Dybjer, P.1
-
20
-
-
0026913084
-
The revised report on the syntactic theories of sequential control and state
-
Felleisen,M. & Hieb, R. (1992) The revised report on the syntactic theories of sequential control and state. Theor. Comput. Sci. 103(2), 235-271.
-
(1992)
Theor. Comput. Sci.
, vol.103
, Issue.2
, pp. 235-271
-
-
Felleisen, M.1
Hieb, R.2
-
24
-
-
84874150343
-
Fully abstract compilation to JavaScript
-
ACM
-
Fournet, C., Swamy, N., Chen, J., Dagand, P.-Ë., Strub, P.-Y. & Livshits, B. (2013) Fully abstract compilation to JavaScript. In Symposium on Principles of Programming Languages. ACM, pp. 371-384.
-
(2013)
Symposium on Principles of Programming Languages
, pp. 371-384
-
-
Fournet, C.1
Swamy, N.2
Chen, J.3
Dagand, P.-Eï.4
Strub, P.-Y.5
Livshits, B.6
-
27
-
-
0141863341
-
Authenticity by typing for security protocols
-
Gordon, A. D. & Jeffrey, A. (2003) Authenticity by typing for security protocols. J. Comput. Secur. 11(4), 451-519.
-
(2003)
J. Comput. Secur.
, vol.11
, Issue.4
, pp. 451-519
-
-
Gordon, A.D.1
Jeffrey, A.2
-
29
-
-
80052015113
-
Verified security for browser extensions
-
IEEE
-
Guha, A., Fredrikson, M., Livshits, B. & Swamy, N. (2011) Verified security for browser extensions. In Security and Privacy. IEEE, pp. 115-130.
-
(2011)
Security and Privacy
, pp. 115-130
-
-
Guha, A.1
Fredrikson, M.2
Livshits, B.3
Swamy, N.4
-
34
-
-
84893080751
-
DKAL*: Constructing executable specifications of authorization protocols
-
Springer
-
Jeannin, J.-B., de Caso, G., Chen, J., Gurevich, Y., Naldurg, P. & Swamy, N. (2013) DKAL*: Constructing executable specifications of authorization protocols. In Engineering Secure Software and Systems. Springer, pp. 139-154.
-
(2013)
Engineering Secure Software and Systems
, pp. 139-154
-
-
Jeannin, J.-B.1
De Caso, G.2
Chen, J.3
Gurevich, Y.4
Naldurg, P.5
Swamy, N.6
-
35
-
-
59249096370
-
Aura: A programming language for authorization and audit
-
ACM
-
Jia, L., Vaughan, J., Mazurak, K., Zhao, J., Zarko, L., Schorr, J. & Zdancewic, S. (2008) Aura: A programming language for authorization and audit. In International Conference on Functional Programming. ACM, pp. 27-38.
-
(2008)
International Conference on Functional Programming
, pp. 27-38
-
-
Jia, L.1
Vaughan, J.2
Mazurak, K.3
Zhao, J.4
Zarko, L.5
Schorr, J.6
Zdancewic, S.7
-
37
-
-
84857603016
-
Equational reasoning about programs with general recursion and call-by-value semantics
-
ACM
-
Kimmell, G., Stump, A., Eades III, H. D., Fu, P., Sheard, T., Weirich, S., Casinghino, C., Sjöberg, V., Collins, N. & Ahn, K. Y. (2012) Equational reasoning about programs with general recursion and call-by-value semantics. In Programming Languages Meets Program Verification. ACM, pp. 15-26.
-
(2012)
Programming Languages Meets Program Verification
, pp. 15-26
-
-
Kimmell, G.1
Stump, A.2
Eades III, H.D.3
Fu, P.4
Sheard, T.5
Weirich, S.6
Casinghino, C.7
Sjöberg, V.8
Collins, N.9
Ahn, K.Y.10
-
40
-
-
0002891241
-
Towards a mathematical science of computation
-
McCarthy, J. (1962) Towards a mathematical science of computation. In IFIP Congress. North- Holland, pp. 21-28.
-
(1962)
IFIP Congress. North- Holland
, pp. 21-28
-
-
McCarthy, J.1
-
42
-
-
59249093515
-
Ynot: Dependent types for imperative programs
-
ACM
-
Nanevski, A., Morrisett, G., Shinnar, A., Govereau, P. & Birkedal, L. (2008) Ynot: Dependent types for imperative programs. In International Conference on Functional Programming. ACM, pp. 229-240.
-
(2008)
International Conference on Functional Programming
, pp. 229-240
-
-
Nanevski, A.1
Morrisett, G.2
Shinnar, A.3
Govereau, P.4
Birkedal, L.5
-
44
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Springer
-
Pedersen, T. P. (1992) Non-interactive and information-theoretic secure verifiable secret sharing. In Advances in Cryptology. Springer, pp. 129-140.
-
(1992)
Advances in Cryptology
, pp. 129-140
-
-
Pedersen, T.P.1
-
47
-
-
77951122326
-
Ott: Effective tool support for the working semanticist
-
Sewell, P., Zappa Nardelli, F., Owens, S., Peskine, G., Ridge, T., Sarkar, S. & Strnisa, R. (2010) Ott: Effective tool support for the working semanticist. J. Funct. Program. 20(1), 1-12.
-
(2010)
J. Funct. Program.
, vol.20
, Issue.1
, pp. 1-12
-
-
Sewell, P.1
Zappa Nardelli, F.2
Owens, S.3
Peskine, G.4
Ridge, T.5
Sarkar, S.6
Strnisa, R.7
-
48
-
-
38049160746
-
Subset coercions in Coq
-
Springer
-
Sozeau, M. (2007) Subset coercions in Coq. In Types for Proofs and Programs. Springer, pp. 237-252.
-
(2007)
Types for Proofs and Programs
, pp. 237-252
-
-
Sozeau, M.1
-
49
-
-
77955240312
-
Equations: A dependent pattern-matching compiler
-
Springer
-
Sozeau, M. (2010). Equations: A dependent pattern-matching compiler. In Interactive Theorem Proving. Springer, pp. 419-434.
-
(2010)
Interactive Theorem Proving
, pp. 419-434
-
-
Sozeau, M.1
-
50
-
-
84863298371
-
Self-Certification: Bootstrapping certified typecheckers in F*with Coq
-
ACM
-
Strub, P.-Y., Swamy, N., Fournet, C. & Chen, J. (2012) Self-certification: Bootstrapping certified typecheckers in F* with Coq. In Principles of Programming Languages. ACM, pp. 571-584.
-
(2012)
Principles of Programming Languages
, pp. 571-584
-
-
Strub, P.-Y.1
Swamy, N.2
Fournet, C.3
Chen, J.4
-
51
-
-
70149084833
-
Verified programming in Guru
-
ACM
-
Stump, A., Deters, M., Petcher, A., Schiller, T. & Simpson, T. (2008) Verified programming in Guru. In Programming Languages Meets Program Verification. ACM, pp. 49-58.
-
(2008)
Programming Languages Meets Program Verification
, pp. 49-58
-
-
Stump, A.1
Deters, M.2
Petcher, A.3
Schiller, T.4
Simpson, T.5
-
52
-
-
85040949627
-
Enforcing stateful authorization and information flow policies in Fine
-
Springer
-
Swamy, N., Chen, J. & Chugh, R. (2010) Enforcing stateful authorization and information flow policies in Fine. In European Symposium on Programming. Springer, pp. 529-549.
-
(2010)
European Symposium on Programming
, pp. 529-549
-
-
Swamy, N.1
Chen, J.2
Chugh, R.3
-
53
-
-
80054054746
-
Secure distributed programming with value-dependent types
-
ACM
-
Swamy, N., Chen, J., Fournet, C., Strub, P.-Y., Bhargavan, K. & Yang, J. (2011) Secure distributed programming with value-dependent types. In International Conference on Functional Programming. ACM, pp. 266-278.
-
(2011)
International Conference on Functional Programming
, pp. 266-278
-
-
Swamy, N.1
Chen, J.2
Fournet, C.3
Strub, P.-Y.4
Bhargavan, K.5
Yang, J.6
-
54
-
-
50249112702
-
Fable: A language for enforcing user-defined security policies
-
IEEE
-
Swamy, N., Corcoran, B. J. & Hicks,M. (2008) Fable: A language for enforcing user-defined security policies. In Security and Privacy. IEEE, pp. 369-383.
-
(2008)
Security and Privacy
, pp. 369-383
-
-
Swamy, N.1
Corcoran, B.J.2
Hicksm, M.3
-
55
-
-
84883094727
-
Verifying higher-order programs with the Dijkstra monad
-
ACM
-
Swamy, N., Weinberger, J., Schlesinger, C., Chen, J. & Livshits, B. (2013) Verifying higher-order programs with the Dijkstra monad. In Programming Languages Design and Implementation. ACM, pp. 387-398.
-
(2013)
Programming Languages Design and Implementation
, pp. 387-398
-
-
Swamy, N.1
Weinberger, J.2
Schlesinger, C.3
Chen, J.4
Livshits, B.5
-
56
-
-
51749116017
-
Evidence-based audit
-
IEEE
-
Vaughan, J. A., Jia, L., Mazurak, K. & Zdancewic, S. (2008) Evidence-based audit. In Computer Security Foundations Symposium. IEEE, pp. 177-191.
-
(2008)
Computer Security Foundations Symposium
, pp. 177-191
-
-
Vaughan, J.A.1
Jia, L.2
Mazurak, K.3
Zdancewic, S.4
-
57
-
-
0030370740
-
A sound type system for secure flow analysis
-
Volpano, D., Smith, G. & Irvine, C. (1996) A sound type system for secure flow analysis. J. Comput. Secur. 4(3), 167-187.
-
(1996)
J. Comput. Secur.
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|