Protection in Programming-Language Translations
暂无分享,去创建一个
[1] Jon G. Riecke,et al. Fully abstract translations between functional languages , 1991, POPL '91.
[2] Martín Abadi,et al. Secure Network Objects , 1999, Secure Internet Programming.
[3] Zhenyu Qian,et al. A Formal Specification of Java Virtual Machine Instructions for Objects, Methods and Subrountines , 1999, Formal Syntax and Semantics of Java.
[4] Martín Abadi,et al. A type system for Java bytecode subroutines , 1999, TOPL.
[5] Ehud Shapiro,et al. Separating concurrent languages with categories of language embeddings , 1991, STOC '91.
[6] Rocco De Nicola,et al. Testing Equivalences for Processes , 1984, Theor. Comput. Sci..
[7] Dan S. Wallach,et al. Java security: Web browsers and beyond , 1997 .
[8] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[9] Jorge Luis Borges,et al. La Muerte Y La Brújula , 1994 .
[10] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[11] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[12] Leslie Lamport,et al. Artificial Intelligence and Language Processing ]acques Cohen Editor a Simple Approach to Specifying Concurrent Systems , 2022 .
[13] Robin Milner,et al. Communication and concurrency , 1989, PHI Series in computer science.
[14] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[15] C MitchellJohn,et al. A type system for object initialization in the Java bytecode language , 1999 .
[16] Robin Milner,et al. Fully Abstract Models of Typed lambda-Calculi , 1977, Theor. Comput. Sci..
[17] Robin Milner,et al. Functions as processes , 1990, Mathematical Structures in Computer Science.
[18] Benedict G. E. Wiedemann. Protection? , 1998, Science.
[19] James H. Morris. Protection in programming languages , 1973, CACM.
[20] Gordon Plotkin,et al. Logical Full Abstraction and PCF , 2000 .
[21] Roger Riggs,et al. A Distributed Object Model for the Java System , 1996, Comput. Syst..
[22] Martín Abadi,et al. Authentication in the Taos operating system , 1994, TOCS.
[23] Rocco De Nicola,et al. Testing Equivalence for Mobile Processes , 1995, Inf. Comput..
[24] Martín Abadi,et al. Secrecy by Typing inSecurity Protocols , 1997, TACS.
[25] Andrew C. Myers,et al. A decentralized model for information flow control , 1997, SOSP.
[26] Xavier Leroy,et al. Security properties of typed applets , 1998, POPL '98.
[27] Robin Milner,et al. The Polyadic π-Calculus: a Tutorial , 1993 .
[28] Robin Milner,et al. A Calculus of Mobile Processes, II , 1992, Inf. Comput..
[29] George C. Necula,et al. The design and implementation of a certifying compiler , 1998, PLDI.
[30] G.D. Plotkin,et al. LCF Considered as a Programming Language , 1977, Theor. Comput. Sci..
[31] Bowen Alpern,et al. Defining Liveness , 1984, Inf. Process. Lett..
[32] John McLean,et al. A General Theory of Composition for a Class of "Possibilistic'' Properties , 1996, IEEE Trans. Software Eng..
[33] Martín Abadi,et al. Secure network objects , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[34] Andrew Birrell. Secure communication using remote procedure calls , 1985, TOCS.
[35] Guy L. Steele,et al. The Java Language Specification , 1996 .
[36] Jon G. Riecke,et al. The SLam calculus: programming with secrecy and integrity , 1998, POPL '98.
[37] Cédric Fournet,et al. The reflexive CHAM and the join-calculus , 1996, POPL '96.
[38] Barbara Liskov,et al. A language extension for expressing constraints on data access , 1978, CACM.
[39] Robin Milner,et al. A Calculus of Mobile Processes, II , 1992, Inf. Comput..
[40] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[41] Martín Abadi,et al. Secrecy by typing in security protocols , 1999, JACM.
[42] Butler W. Lampson,et al. Reflections on an operating system design , 1976, CACM.
[43] Butler W. Lampson,et al. Hints for Computer System Design , 1983, IEEE Software.
[44] Frank Yellin,et al. The Java Virtual Machine Specification , 1996 .
[45] Martín Abadi,et al. Reasoning about Cryptographic Protocols in the Spi Calculus , 1997, CONCUR.
[46] John C. Mitchell. On Abstraction and the Expressive Power of Programming Languages , 1991, Sci. Comput. Program..