Sciweavers

38 search results - page 5 / 8
» Verifying Compliance of Trusted Programs
Sort
View
ECOOP
2009
Springer
14 years 8 months ago
Practical API Protocol Checking with Access Permissions
Reusable APIs often dene usage protocols. We previously developed a sound modular type system that checks compliance with typestate-based protocols while aording a great deal of al...
Kevin Bierhoff, Nels E. Beckman, Jonathan Aldrich
JTRES
2010
ACM
13 years 7 months ago
Developing safety critical Java applications with oSCJ/L0
We present oSCJ, an implementation of the draft of Safety Critical Java (SCJ) specification. SCJ is designed to make Java amenable to writing mission- and safety-critical software...
Ales Plsek, Lei Zhao, Veysel H. Sahin, Daniel Tang...
TGC
2007
Springer
14 years 1 months ago
A Protocol Compiler for Secure Sessions in ML
Distributed applications can be structured using sessions that specify flows of messages between roles. We design a small specific language to declare sessions. We then build a c...
Ricardo Corin, Pierre-Malo Deniélou
ICFP
2009
ACM
14 years 8 months ago
Effective interactive proofs for higher-order imperative programs
We present a new approach for constructing and verifying higherorder, imperative programs using the Coq proof assistant. We build on the past work on the Ynot system, which is bas...
Adam J. Chlipala, J. Gregory Malecha, Greg Morrise...
ICFP
2008
ACM
14 years 7 months ago
Ynot: dependent types for imperative programs
We describe an axiomatic extension to the Coq proof assistant, that supports writing, reasoning about, and extracting higher-order, dependently-typed programs with side-effects. C...
Aleksandar Nanevski, Greg Morrisett, Avraham Shinn...