-
1
-
-
0032681509
-
A core calculus of dependency
-
San Antonio, Texas, Jan. ACM Press
-
M. Abadi, A. Banerjee, N. Heintze, and J. G. Riecke. A core calculus of dependency. In Conference Record of the 26th ACM Symposium on Principles of Programming Languages, pages 147-160, San Antonio, Texas, Jan. 1999. ACM Press. URL: http://www.soe.ucsc.edu/~abadi/Papers/flowpopl.ps.
-
(1999)
Conference Record of the 26th ACM Symposium on Principles of Programming Languages
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.G.4
-
2
-
-
0029694540
-
Analysis and caching of dependencies
-
Philadelphia, Pennsylvania, May ACM Press
-
M. Abadi, B. Lampson, and J.-J. Lévy. Analysis and caching of dependencies. In Proceedings of the 1996 ACM SIGPLAN International Conference on Functional Programming, pages 83-91, Philadelphia, Pennsylvania, May 1996. ACM Press. URL: http://www.soe.ucsc.edu/~abadi/Papers/make-preprint.ps.
-
(1996)
Proceedings of the 1996 ACM SIGPLAN International Conference on Functional Programming
, pp. 83-91
-
-
Abadi, M.1
Lampson, B.2
Lévy, J.-J.3
-
4
-
-
84937705299
-
Static analysis of processes for no read-up and no write-down
-
W. Thomas, editor, Proceedings of FoSSaCS'99, Springer, Mar.
-
C. Bodei, P. Degano, F. Nielson, and H. R. Nielson. Static analysis of processes for no read-up and no write-down. In W. Thomas, editor, Proceedings of FoSSaCS'99, volume 1578 of Lecture Notes in Computer Science, pages 120-134. Springer, Mar. 1999. URL: http://www.di.unipi.it/~chiara/publ-40/BDNN99.ps.
-
(1999)
Lecture Notes in Computer Science
, vol.1578
, pp. 120-134
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
7
-
-
84974776068
-
A classification of security properties for process algebras
-
R. Focardi and R. Gorrieri. A classification of security properties for process algebras. Journal of Computer Security, 3(1):5-33, 1995. URL: http://www.cs.unibo.it/~gorrieri/Papers/jcsfinal.ps.gz.
-
(1995)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
8
-
-
20144362494
-
-
Technical Report University of Sussex, Nov.
-
M. Hennessy. The security picalculus and noninterference. Technical Report 2000:05, University of Sussex, Nov. 2000. URL: ftp://ftp.cogs.susx.ac.uk/pub/reports/compsci/cs052000.ps.Z.
-
(2000)
The Security Picalculus and Noninterference
-
-
Hennessy, M.1
-
9
-
-
84974577536
-
Information flow vs. resource access in the asynchronous pi-calculus
-
Proceedings of the 27th International Colloquium on Automata, Languages and Programming, Springer-Verlag, July
-
M. Hennessy and J. Riely. Information flow vs. resource access in the asynchronous pi-calculus. In Proceedings of the 27th International Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science. Springer-Verlag, July 2000. URL: http://www.depaul.edu/~jriely/papers/00icalp.ps.gz.
-
(2000)
Lecture Notes in Computer Science
-
-
Hennessy, M.1
Riely, J.2
-
11
-
-
84947269249
-
Secure information flow as typed process behaviour
-
G. Smolka, editor, Proceedings of the 2000 European Symposium on Programming (ESOP'00), Springer Verlag, Mar.
-
K. Honda, V. Vasconcelos, and N. Yoshida. Secure information flow as typed process behaviour. In G. Smolka, editor, Proceedings of the 2000 European Symposium on Programming (ESOP'00), volume 1782 of Lecture Notes in Computer Science, pages 180-199. Springer Verlag, Mar. 2000. URL: ftp://ftp.dcs.qmw.ac.uk/lfp/kohei/siftp-esop00.ps.gz.
-
(2000)
Lecture Notes in Computer Science
, vol.1782
, pp. 180-199
-
-
Honda, K.1
Vasconcelos, V.2
Yoshida, N.3
-
13
-
-
0034714632
-
Type reconstruction for linear π-calculus with I/O subtyping
-
Aug.
-
A. Igarashi and N. Kobayashi. Type reconstruction for linear π-calculus with I/O subtyping. Information & Computation, 161:1-44, Aug. 2000. URL: http://www.graco.c.u-tokyo.ac.jp/~igarashi/papers/LinearPi.ps.gz.
-
(2000)
Information & Computation
, vol.161
, pp. 1-44
-
-
Igarashi, A.1
Kobayashi, N.2
-
14
-
-
0001065208
-
Linearity and the Pi-Calculus
-
Sept.
-
N. Kobayashi, B. C. Pierce, and D. N. Turner. Linearity and the Pi-Calculus. ACM Transactions on Programming Languages and Systems, 21(5):914-947, Sept. 1999. URL: http://www.acm.org/pubs/citations/journals/toplas/1999-21-5/p914-kobayashi/.
-
(1999)
ACM Transactions on Programming Languages and Systems
, vol.21
, Issue.5
, pp. 914-947
-
-
Kobayashi, N.1
Pierce, B.C.2
Turner, D.N.3
-
15
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
IEEE Press
-
J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. IEEE Press, 1994. URL: http://chacs.nrl.navy.mil/publications/CHACS/1994/1994mclean-sp.ps.
-
(1994)
Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy
-
-
McLean, J.1
-
16
-
-
0003604327
-
-
Technical Report Laboratory for Foundations of Computer Science, Department of Computer Science, University of Edinburgh, Oct.
-
R. Milner. The polyadic π-calculus: a tutorial. Technical Report ECS-LFCS-91-180, Laboratory for Foundations of Computer Science, Department of Computer Science, University of Edinburgh, Oct. 1991. URL: ftp://ftp.cl.cam.ac.uk/users/rm135/ppi.ps.Z.
-
(1991)
The Polyadic π-calculus: A Tutorial
-
-
Milner, R.1
-
17
-
-
84968816021
-
Barbed bisimulation
-
W. Kuich, editor, International Colloquium on Automata, Languages and Programming, Vienna, Austria, July Springer-Verlag
-
R. Milner and D. Sangiorgi. Barbed bisimulation. In W. Kuich, editor, International Colloquium on Automata, Languages and Programming, volume 623 of Lecture Notes in Computer Science, pages 685-695, Vienna, Austria, July 1992. Springer-Verlag. URL: ftp://ftp-sop.inria.fr/meije/theorie-par/davides/bn.ps.gz.
-
(1992)
Lecture Notes in Computer Science
, vol.623
, pp. 685-695
-
-
Milner, R.1
Sangiorgi, D.2
-
22
-
-
0033719707
-
Secure composition of untrusted code: Wrappers and causality types
-
IEEE Computer Society Press, July
-
P. Sewell and J. Vitek. Secure composition of untrusted code: Wrappers and causality types. In Proceedings of the 13th Computer Security Foundations Workshop. IEEE Computer Society Press, July 2000. URL: http://www.cl.cam.ac.uk/users/pes20/wraptypes.ps.gz.
-
(2000)
Proceedings of the 13th Computer Security Foundations Workshop
-
-
Sewell, P.1
Vitek, J.2
-
24
-
-
0034835461
-
A new type system for secure information flow
-
Cape Breton, Nova Scotia, June
-
G. S. Smith. A new type system for secure information flow. In Proc. 14th IEEE Computer Security Foundations Workshop, pages 115-125, Cape Breton, Nova Scotia, June 2001. URL: http://www.cs.fiu.edu/~smithg/papers/csfw01.ps.gz.
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop
, pp. 115-125
-
-
Smith, G.S.1
-
25
-
-
84947920982
-
Graph types for monadic mobile processes
-
V. Chandru and V. Vinay, editors, Proceedings of the 16th Conference on Foundations of Software Technology and Theoretical Computer Science, Springer-Verlag
-
N. Yoshida. Graph types for monadic mobile processes. In V. Chandru and V. Vinay, editors, Proceedings of the 16th Conference on Foundations of Software Technology and Theoretical Computer Science, volume 1180 of Lecture Notes in Computer Science, pages 371-386. Springer-Verlag, 1996. URL: http://www.mcs.le.ac.uk/~nyoshida/paper/graph1-short.ps.gz.
-
(1996)
Lecture Notes in Computer Science
, vol.1180
, pp. 371-386
-
-
Yoshida, N.1
-
26
-
-
26344459336
-
-
Technical Report University of Leicester, Dec.
-
N. Yoshida, K. Honda, and M. Berger. Linearity and bisimulation. Technical Report MSC-2001/48, University of Leicester, Dec. 2001. URL: http://www.mcs.le.ac.uk/~nyoshida/paper/lb.ps.gz.
-
(2001)
Linearity and Bisimulation
-
-
Yoshida, N.1
Honda, K.2
Berger, M.3
-
27
-
-
19044369934
-
Linearity and bisimulation
-
Proceedings of 5th International Conference of Foundations of Software Science and Computer Structures (FoSSaCs 2002), Springer Verlag, Apr.
-
N. Yoshida, K. Honda, and M. Berger. Linearity and bisimulation. In Proceedings of 5th International Conference of Foundations of Software Science and Computer Structures (FoSSaCs 2002), Lecture Notes in Computer Science. Springer Verlag, Apr. 2002. URL: http://www.mcs.le.ac.uk/~nyoshida/paper/fossacs-ca-final.ps.gz.
-
(2002)
Lecture Notes in Computer Science
-
-
Yoshida, N.1
Honda, K.2
Berger, M.3
-
28
-
-
84945262623
-
Secure information flow and CPS
-
D. Sands, editor, Proceedings of the 2001 European Symposium on Programming (ESOP'01), Genova, Italy, Apr. Springer Verlag
-
S. Zdancewic and A. C. Myers. Secure information flow and CPS. In D. Sands, editor, Proceedings of the 2001 European Symposium on Programming (ESOP'01), Lecture Notes in Computer Science, Genova, Italy, Apr. 2001. Springer Verlag. URL: http://www.cs.cornell.edu/zdance/lincont.ps.
-
(2001)
Lecture Notes in Computer Science
-
-
Zdancewic, S.1
Myers, A.C.2
|