Author of the publication

03411 Final Report - Language Based Security.

, , , and . Language Based Security, volume 03411 of Dagstuhl Seminar Proceedings, IBFI, Schloss Dagstuhl, Germany, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicate Transformer Semantics of an Oberon-Like Language.. PROCOMET, volume A-56 of IFIP Transactions, page 467-487. North-Holland, (1994)Observational Purity and Encapsulation.. FASE, volume 3442 of Lecture Notes in Computer Science, page 190-204. Springer, (2005)Toward Tool-Independent Summaries for Symbolic Execution., , , , and . ECOOP, volume 263 of LIPIcs, page 24:1-24:29. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)An Illustrated Guide to the Model Theory of Supertype Abstraction and Behavioral Subtyping., and . SETSS, volume 11174 of Lecture Notes in Computer Science, page 39-88. Springer, (2017)A Simple Semantics and Static Analysis for Stack Inspection., and . Festschrift for Dave Schmidt, volume 129 of EPTCS, page 284-308. (2013)Dynamic Boundaries: Information Hiding by Second Order Framing with First Order Assertions., and . ESOP, volume 6012 of Lecture Notes in Computer Science, page 2-22. Springer, (2010)Spartan Jester: End-to-End Information Flow Control for Hybrid Android Applications., , and . IEEE Symposium on Security and Privacy Workshops, page 157-162. IEEE Computer Society, (2017)Information Flow Monitor Inlining., and . CSF, page 200-214. IEEE Computer Society, (2010)A Recursion Theorem for Predicate Transformers on Inductive Data Types.. Inf. Process. Lett., 50 (6): 329-336 (1994)Calculating sharp adaptation rules.. Inf. Process. Lett., 77 (2-4): 201-208 (2001)