Sciweavers

709 search results - page 92 / 142
» Type Checking in XOBE
Sort
View
APLAS
2010
ACM
13 years 9 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
TCS
2008
13 years 8 months ago
Role-based access control for boxed ambients
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acad...
Adriana B. Compagnoni, Elsa L. Gunter, Philippe Bi...
CSMR
2005
IEEE
14 years 2 months ago
Tracing Cross-Cutting Requirements via Context-Based Constraints
In complex systems, it is difficult to identify which system element is involved in which requirement. In this article, we present a new approach for expressing and validating a ...
Felix Bübl, Michael Balser
PPDP
2001
Springer
14 years 1 months ago
Trust in the Pi-Calculus
We introduce a new system of trust analysis for concurrent and distributed systems using the π-calculus[13, 14, 15] as a modelling tool. A Type system using boolean annotations g...
Mark Hepburn, David Wright
FMCO
2007
Springer
103views Formal Methods» more  FMCO 2007»
14 years 3 months ago
Safety Guarantees from Explicit Resource Management
We present a language and a program analysis that certifies the safe use of flexible resource management idioms, in particular advance reservation or “block booking” of costl...
David Aspinall, Patrick Maier, Ian Stark