Language-based information-flow security
A Sabelfeld, AC Myers - IEEE Journal on selected areas in …, 2003 - ieeexplore.ieee.org
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …
behavior of a computing system satisfies important security policies such as confidentiality …
The type and effect discipline
JP Talpin, P Jouvelot - Information and computation, 1994 - Elsevier
The type and effect discipline is a new framework for reconstructing the principal type and
the minimal effect of expressions in implicitly typed polymorphic functional languages that …
the minimal effect of expressions in implicitly typed polymorphic functional languages that …
A type system for certified binaries
A certified binary is a value together with a proof that the value satisfies a given specification.
Existing compilers that generate certified code have focused on simple memory and control …
Existing compilers that generate certified code have focused on simple memory and control …
[PDF][PDF] A security kernel based on the lambda-calculus
JA Rees - 1995 - dspace.mit.edu
Cooperation between independent agents depends upon establishing a degree of security.
Each of the cooperating agents needs assurance that the cooperation will not endanger …
Each of the cooperating agents needs assurance that the cooperation will not endanger …
A type system for certified binaries
A certified binary is a value together with a proof that the value satisfies a given specification.
Existing compilers that generate certified code have focused on simple memory and control …
Existing compilers that generate certified code have focused on simple memory and control …
Modular verification of information flow security in component-based systems
We propose a novel method for the verification of information flow security in component-
based systems. The method is (a) modular wrt services and components, ie, overall security …
based systems. The method is (a) modular wrt services and components, ie, overall security …
[图书][B] Report on the FX-91 programming language
DK Gifford, P Jouvelot, MA Sheldon, JW O'Toole - 1992 - apps.dtic.mil
This report gives a defining description of the programming language FX-91. The FX short
for FX-91 programming language is designed to support the parallel implementation of …
for FX-91 programming language is designed to support the parallel implementation of …
Dynamic modules in higher-order languages
S Jagannathan - … of 1994 IEEE International Conference on …, 1994 - ieeexplore.ieee.org
Providing programmers the ability to construct meaningful abstractions to help manage
complexity is a serious language design issue. Many languages define a module system …
complexity is a serious language design issue. Many languages define a module system …
[PDF][PDF] Another module system for Scheme
J Rees - Included in the Scheme, 1994 - Citeseer
The module system supports the structured division of a corpus of Scheme software into a
set of modules. Each module has its own isolated namespace, with visibility of bindings …
set of modules. Each module has its own isolated namespace, with visibility of bindings …
[PDF][PDF] An application framework for compositional modularity
GS Banavar - 1995 - cs.utah.edu
This dissertation presents a framework for the application of compositional modularity, a
module model that facilitates extensive reuse of highly decomposed software …
module model that facilitates extensive reuse of highly decomposed software …