Sciweavers

POPL
2000
ACM
13 years 8 months ago
Verifying Secrets and Relative Secrecy
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given value. For example, an ATM machi...
Dennis M. Volpano, Geoffrey Smith
POPL
2000
ACM
13 years 8 months ago
Generalized Certificate Revocation
We introduce a language for creating and manipulating certificates, that is, digitally signed data based on public key cryptography, and a system for revoking certificates. Our ap...
Carl A. Gunter, Trevor Jim
POPL
2000
ACM
13 years 8 months ago
Resource Bound Certification
Various code certification systems allow the certification and static verification of important safety properties such as memory and control-flow safety. These systems are valuabl...
Karl Crary, Stephanie Weirich
POPL
2000
ACM
13 years 8 months ago
Modular Refinement of Hierarchic Reactive Machines
with existing analysis tools. Modular reasoning principles such as abstraction, compositional refinement, and assume-guarantee reasoning are well understood for architectural hiera...
Rajeev Alur, Radu Grosu
POPL
2000
ACM
13 years 9 months ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
POPL
2000
ACM
13 years 9 months ago
Projection Merging: Reducing Redundancies in Inclusion Constraint Graphs
Zhendong Su, Manuel Fähndrich, Alexander Aike...
POPL
2000
ACM
13 years 9 months ago
A Type System for Dynamic Web Documents
Many interactive Web services use the CGI interface for communication with clients. They will dynamically create HTML documents that are presented to the client who then resumes t...
Anders Sandholm, Michael I. Schwartzbach
POPL
2000
ACM
13 years 9 months ago
Semantics-Preserving Procedure Extraction
Procedure extraction is an important program transformation that can be used to make programs easier to understand and maintain, to facilitate code reuse, and to convert “monoli...
Raghavan Komondoor, Susan Horwitz
POPL
2000
ACM
13 years 9 months ago
Type Systems for Distributed Data Structures
Distributed-memory programs are often written using a global address space: any process can name any memory location on any processor. Some languages completely hide the distincti...
Ben Liblit, Alexander Aiken