Author of the publication

03411 Abstracts Collection - Language Based Security.

, , , and . Language Based Security, volume 03411 of Dagstuhl Seminar Proceedings, IBFI, Schloss Dagstuhl, Germany, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stackability in the Simply-Typed Call-by-Value Lambda Calculus., and . SAS, volume 864 of Lecture Notes in Computer Science, page 131-146. Springer, (1994)Design and Correctness of Program Transformations Based on Control-Flow Analysis., , and . TACS, volume 2215 of Lecture Notes in Computer Science, page 420-447. Springer, (2001)Automata-Based Confidentiality Monitoring., , , and . ASIAN, volume 4435 of Lecture Notes in Computer Science, page 75-89. Springer, (2006)Information Flow Analysis in Logical Form., and . SAS, volume 3148 of Lecture Notes in Computer Science, page 100-115. Springer, (2004)Programming Paradigm Driven Heap Analysis., , and . CC, volume 7210 of Lecture Notes in Computer Science, page 41-60. Springer, (2012)Regional Logic for Local Reasoning about Global Invariants., , and . ECOOP, volume 5142 of Lecture Notes in Computer Science, page 387-411. Springer, (2008)Using Access Control for Secure Information Flow in a Java-like Language., and . CSFW, page 155-169. IEEE Computer Society, (2003)A Relational Program Logic with Data Abstraction and Dynamic Framing., , , and . ACM Trans. Program. Lang. Syst., 44 (4): 25:1-25:136 (December 2022)Subjective Simulation as a Notion of Morphism for Composing Concurrent Resources., , and . CoRR, (2017)Mechanized verification of fine-grained concurrent programs., , and . PLDI, page 77-87. ACM, (2015)