Author of the publication

03411 Final Report - Language Based Security.

, , , and . Language Based Security, volume 03411 of Dagstuhl Seminar Proceedings, IBFI, Schloss Dagstuhl, Germany, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stackability in the Simply-Typed Call-by-Value Lambda Calculus., and . SAS, volume 864 of Lecture Notes in Computer Science, page 131-146. Springer, (1994)Design and Correctness of Program Transformations Based on Control-Flow Analysis., , and . TACS, volume 2215 of Lecture Notes in Computer Science, page 420-447. Springer, (2001)Information Flow Analysis in Logical Form., and . SAS, volume 3148 of Lecture Notes in Computer Science, page 100-115. Springer, (2004)Automata-Based Confidentiality Monitoring., , , and . ASIAN, volume 4435 of Lecture Notes in Computer Science, page 75-89. Springer, (2006)Programming Paradigm Driven Heap Analysis., , and . CC, volume 7210 of Lecture Notes in Computer Science, page 41-60. Springer, (2012)Are there any reliable leading indicators for US inflation and GDP growth?, and . International Journal of Forecasting, 22 (1): 137--151 (00 2006)Subjective Simulation as a Notion of Morphism for Composing Concurrent Resources., , and . CoRR, (2017)A Relational Program Logic with Data Abstraction and Dynamic Framing., , , and . ACM Trans. Program. Lang. Syst., 44 (4): 25:1-25:136 (December 2022)Mechanized verification of fine-grained concurrent programs., , and . PLDI, page 77-87. ACM, (2015)Using Access Control for Secure Information Flow in a Java-like Language., and . CSFW, page 155-169. IEEE Computer Society, (2003)