Sciweavers

730 search results - page 48 / 146
» Security-typed programming within dependently typed programm...
Sort
View
POPL
2012
ACM
12 years 4 months ago
Algebraic foundations for effect-dependent optimisations
We present a general theory of Gifford-style type and effect annotations, where effect annotations are sets of effects. Generality is achieved by recourse to the theory of algebra...
Ohad Kammar, Gordon D. Plotkin
POPL
1995
ACM
14 years 1 days ago
Compiling Polymorphism Using Intensional Type Analysis
Traditional techniques for implementing polymorphism use a universal representation for objects of unknown type. Often, this forces a compiler to use universal representations eve...
Robert Harper, J. Gregory Morrisett
FASE
2004
Springer
14 years 1 months ago
Enhancing Remote Method Invocation through Type-Based Static Analysis
Abstract. Distributed applications rely on middleware to enable interaction among remote components. Thus, the overall performance increasingly depends on the interplay between the...
Carlo Ghezzi, Vincenzo Martena, Gian Pietro Picco
ATVA
2010
Springer
163views Hardware» more  ATVA 2010»
13 years 8 months ago
Automatic Generation of History-Based Access Control from Information Flow Specification
This paper proposes a method for automatically inserting check statements for access control into a given recursive program according to a given security specification. A history-b...
Yoshiaki Takata, Hiroyuki Seki
PASTE
2005
ACM
14 years 2 months ago
Representation-independent program analysis
Program analysis has many applications in software engineering and high-performance computation, such as program understanding, debugging, testing, reverse engineering, and optimi...
Michelle Mills Strout, John M. Mellor-Crummey, Pau...