Author of the publication

03411 Abstracts Collection - Language Based Security.

, , , and . Language Based Security, volume 03411 of Dagstuhl Seminar Proceedings, IBFI, Schloss Dagstuhl, Germany, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards squiggly refinement algebra.. PROCOMET, volume 125 of IFIP Conference Proceedings, page 346-365. Chapman & Hall, (1998)A Recursion Theorem for Predicate Transformers on Inductive Data Types.. Inf. Process. Lett., 50 (6): 329-336 (1994)Calculating sharp adaptation rules.. Inf. Process. Lett., 77 (2-4): 201-208 (2001)Modular verification of higher-order methods with mandatory calls specified by model programs., , and . OOPSLA, page 351-368. ACM, (2007)Representation independence, confinement and access control extended abstract., and . POPL, page 166-177. ACM, (2002)ACM SIGPLAN Notices 37(1), January 2002.Deriving an Information Flow Checker and Certifying Compiler for Java., , and . S&P, page 230-242. IEEE Computer Society, (2006)A Logical Analysis of Framing for Specifications with Pure Method Calls., and . VSTTE, volume 8471 of Lecture Notes in Computer Science, page 3-20. Springer, (2014)Decision Procedures for Region Logic., , and . VMCAI, volume 7148 of Lecture Notes in Computer Science, page 379-395. Springer, (2012)Derivation of programs for freshmen., , , and . SIGCSE, page 116-120. ACM, (1994)Towards Imperative Modules: Reasoning about Invariants and Sharing of Mutable State., and . LICS, page 313-323. IEEE Computer Society, (2004)