Search
for Author
All Reviews
Blanchet, Bruno
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
4
of
4
reviews
Analyzing security protocols with secrecy types and logic programs
Abadi M., Blanchet B. Journal of the ACM 52(1): 102-146, 2005. Type: Article
This paper extends previous efforts carried out by Abadi and Blanchet toward the use of type systems to analyze security protocols. Some classic work on information flow security relies on assigning security classes to objects. A cruci...
...
Mar 18 2005
Escape analysis for Java: theory and practice
Blanchet B. ACM Transactions on Programming Languages and Systems 25(6): 713-775, 2003. Type: Article
Escape analysis is becoming increasingly important for those interested in constructing compilers for the Java programming language. An object is said to escape a subsystem when that object can be accessed from outside of the system; t...
...
May 17 2004
Design and implementation of a special-purpose static program analyzer for safety-critical real-time embedded software
Blanchet B., Cousot P., Cousot R., Feret J., Mauborgne L., Miné A., Monniaux D., Rival X. In
The essence of computation
. New York, NY: Springer-Verlag New York, Inc., 2002. Type: Book Chapter
This is a welcome addition to the literature on abstract interpretation, as it describes a non-trivial analysis in a subset of the C programming language. For many years most papers have applied such interpretation on functional langua...
...
Oct 3 2003
Secrecy types for asymmetric communication
Abadi M., Blanchet B. Theoretical Computer Science 298(3): 387-415, 2003. Type: Article
A very general theory about secrecy in the context of security protocols, using the methods of process calculi and type systems, is presented in this paper....
...
Jul 29 2003
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy