Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Blanchet, Bruno Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 4 of 4 reviews    
  Analyzing security protocols with secrecy types and logic programs
Abadi M., Blanchet B. Journal of the ACM 52(1): 102-146, 2005.  Type: Article

This paper extends previous efforts carried out by Abadi and Blanchet toward the use of type systems to analyze security protocols. Some classic work on information flow security relies on assigning security classes to objects. A cruci...
...
Mar 18 2005  
  Escape analysis for Java: theory and practice
Blanchet B. ACM Transactions on Programming Languages and Systems 25(6): 713-775, 2003.  Type: Article

Escape analysis is becoming increasingly important for those interested in constructing compilers for the Java programming language. An object is said to escape a subsystem when that object can be accessed from outside of the system; t...
...
May 17 2004  
  Design and implementation of a special-purpose static program analyzer for safety-critical real-time embedded software
Blanchet B., Cousot P., Cousot R., Feret J., Mauborgne L., Miné A., Monniaux D., Rival X. In The essence of computation. New York, NY: Springer-Verlag New York, Inc., 2002.  Type: Book Chapter

This is a welcome addition to the literature on abstract interpretation, as it describes a non-trivial analysis in a subset of the C programming language. For many years most papers have applied such interpretation on functional langua...
...
Oct 3 2003  
  Secrecy types for asymmetric communication
Abadi M., Blanchet B. Theoretical Computer Science 298(3): 387-415, 2003.  Type: Article

A very general theory about secrecy in the context of security protocols, using the methods of process calculi and type systems, is presented in this paper....
...
Jul 29 2003  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy