Martín Abadi. Secrecy by typing in security protocols. In Theoretical Aspects of Computer Software, volume 1281 of Lecture Notes in Computer Science, pages 611–638. Springer-Verlag, 1997.
Martín Abadi, Cédric Fournet, and Georges Gonthier. Secure implementation of channel abstractions. In Proceedings of the Thirteenth Annual IEEE Symposium on Logic in Computer Science, June 1998. To appear.
Martín Abadi and Andrew D. Gordon. A calculus for cryptographic protocols: The spi calculus. Technical Report 414, University of Cambridge Computer Laboratory, January 1997. Extended version of both [AG97b] and [AG97c]. A revised version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998, and an abridged version will appear in Information and Computation.
Martín Abadi and Andrew D. Gordon. A calculus for cryptographic protocols: The spi calculus. In Proceedings of the Fourth ACM Conference on Computer and Communications Security, pages 36–47, 1997.
Martín Abadi and Andrew D. Gordon. Reasoning about cryptographic protocols in the spi calculus. In Proceedings of the 8th International Conference on Concurrency Theory, volume 1243 of Lecture Notes in Computer Science, pages 59–73. Springer-Verlag, July 1997.
Bowen Alpern and Fred B. Schneider. Defining liveness. Information Processing Letters
, 21(4):181–185, October 1985.MATHMathSciNetCrossRefGoogle Scholar
Andrew D. Birrell. Secure communication using remote procedure calls. ACM Transactions on Computer Systems
, 3(1):1–14, February 1985.MathSciNetCrossRefGoogle Scholar
Michele Boreale and Rocco De Nicola. Testing equivalence for mobile processes. Information and Computation
, 120(2):279–303, August 1995.MATHMathSciNetCrossRefGoogle Scholar
Jorge Luis Borges. La muerte y la brÚjula. In Obras completas 1923–1972
, pages 499–507. Emecé Editores, Buenos Aires, 1974. Titled “Death and the compass” in English translations.Google Scholar
Richard M. Cohen. Defensive Java Virtual Machine version 0.5 alpha release. Web pages at http://www.cli.com/, May 13, 1997.
Dorothy E. Denning. Cryptography and Data Security
. Addison-Wesley, Reading, Mass., 1982.MATHGoogle Scholar
Drew Dean, Edward W. Feiten, Dan S. Wallach, and Dirk Balfanz. Java security: Web browsers and beyond. In Dorothy E. Denning and Peter J. Denning, editors, Internet beseiged: countering cyberspace scofflaws, pages 241–269. ACM Press, 1998.
Rocco De Nicola and Matthew C. B. Hennessy. Testing equivalences for processes. Theoretical Computer Science
, 34:83–133, 1984.MATHMathSciNetCrossRefGoogle Scholar
Whitfield Diffie, Paul C. van Oorschot, and Michael J. Wiener. Authentication and authenticated key exchanges. Designs, Codes and Cryptography
, 2:107–125, 1992.CrossRefGoogle Scholar
Cédric Fournet and Georges Gonthier. The reflexive chemical abstract machine and the join-calculus. In Proceedings of the 23rd ACM Symposium on Principles of Programming Languages, pages 372–385, January 1996.
Stephen N. Freund and John C. Mitchell. A type system for object initialization in the Java bytecode language. On the Web at http://theory.Stanford.edu/~freunds/, 1998.
James Gosling, Bill Joy, and Guy L. Steele. The Java Language Specification. Addison-Wesley, 1996.
C. A. R. Hoare. Proof of correctness of data representations. Acta Informatica
, 1:271–281, 1972.MATHCrossRefGoogle Scholar
Nevin Heintze and Jon G. Riecke. The SLam calculus: programming with secrecy and integrity. In Proceedings of the 25th ACM Symposium on Principles of Programming Languages, pages 365–377, 1998.
Anita K. Jones and Barbara H. Liskov. A language extension for expressing constraints on data access. Communications of the ACM
, 21(5):358–367, May 1978.MATHCrossRefGoogle Scholar
Butler W. Lampson. Protection. In Proceedings of the 5th Princeton Conference on Information Sciences and Systems, pages 437–443, 1971.
Butler W. Lampson. Hints for computer system design. Operating Systems Review
, 17(5):33–48, October 1983. Proceedings of the Ninth ACM Symposium on Operating System Principles.CrossRefGoogle Scholar
Leslie Lamport. A simple approach to specifying concurrent systems. Communications of the ACM
, 32(1):32–45, January 1989.MathSciNetCrossRefGoogle Scholar
John Longley and Gordon Plotkin. Logical full abstraction and PCF. In Jonathan Ginzburg, Zurab Khasidashvili, Carl Vogel, Jean-Jacques Lévy, and Enric Vallduví, editors, The Tbilisi Symposium on Logic, Language and Computation: Selected Papers, pages 333–352. CSLI Publications and FoLLI, 1998.
Xavier Leroy and Franccois Rouaix. Security properties of typed applets. In Proceedings of the 25th ACM Symposium on Principles of Programming Languages, pages 391–403, 1998.
Butler W. Lampson and Howard E. Sturgis. Reflections on an operating system design. Communications of the ACM
, 19(5):251–265, May 1976.CrossRefGoogle Scholar
Tim Lindholm and Frank Yellin. The Java Virtual Machine Specification. Addison-Wesley, 1996.
John McLean, A general theory of composition for a class of “possibilistic” properties. IEEE Transactions on Software Engineering
, 22(1):53–66, January 1996.CrossRefGoogle Scholar
Robin Milner. Communication and Concurrency. Prentice-Hall International, 1989.
Robin Milner. Functions as processes. Mathematical Structures in Computer Science
, 2:119–141, 1992.MATHMathSciNetCrossRefGoogle Scholar
Robin Milner. The polyadic π-calculus: a tutorial. In Bauer, Brauer, and Schwichtenberg, editors, Logic and Algebra of Specification. Springer-Verlag, 1993.
John C. Mitchell. On abstraction and the expressive power of programming languages. Science of Computer Programming
, 21(2):141–163, October 1993.MATHMathSciNetCrossRefGoogle Scholar
Andrew C. Myers and Barbara Liskov. A decentralized model for information flow control. In Proceedings of the 16th ACM Symposium on Operating System Principles, pages 129–142, 1997.
James H. Morris, Jr. Protection in programming languages. Communications of the ACM
, 16(1):15–21, January 1973.MATHCrossRefGoogle Scholar
Robin Milner, Joachim Parrow, and David Walker. A calculus of mobile processes, parts I and II. Information and Computation
, 100:1–40 and 41–77, September 1992.MATHMathSciNetCrossRefGoogle Scholar
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.
Greg Morrisett, David Walker, Karl Crary, and Neal Glew. From System F to Typed Assembly Language. In Proceedings of the 25th ACM Symposium on Principles of Programming Languages, pages 85–97, 1998.
George C. Necula and Peter Lee. The design and implementation of a certifying compiler. To appear in the proceedings of PLDI'98, 1997.
Gordon Plotkin. LCF considered as a programming language. Theoretical Computer Science
, 5:223–256, 1977.MathSciNetCrossRefGoogle Scholar
Zhenyu Qian. A formal specification of Java(tm) Virtual Machine instructions (draft). Web page at http://www.informatik.uni-bremen.de/~qian/abs-f sjvm.html, 1997.
Raymie Stata and Martín Abadi. A type system for Java bytecode sub-routines. In Proceedings of the 25th ACM Symposium on Principles of Programming Languages, pages 149–160, January 1998.
Ehud Shapiro. Separating concurrent languages with categories of language embeddings. In Proceedings of the Twenty Third Annual ACM Symposium on the Theory of Computing, pages 198–208, 1991.
Sun Microsystems, Inc. Inner classes specification. Web pages at http://java.sun.com/products/jdk/1.1/docs/guide/innerclasses/, 1997.
Sun Microsystems, Inc. RMI enhancements. Web pages at http://java.sun.com/products/jdk/1.2/docs/guide/rmi/index.html, 1997.
Leendert van Doom, Martín Abadi, Mike Burrows, and Edward Wobber. Secure network objects. In Proceedings 1996 IEEE Symposium on Security and Privacy, pages 211–221, May 1996.
Dennis Volpano, Cynthia Irvine, and Geoffrey Smith. A sound type system for secure flow analysis. Journal of Computer Security
, 4:167–187, 1996.Google Scholar
Edward Wobber, Martín Abadi, Michael Burrows, and Butler Lampson. Authentication in the Taos operating system. ACM Transactions on Computer Systems
, 12(1):3–32, February 1994.CrossRefGoogle Scholar
Ann Wollrath, Roger Riggs, and Jim Waldo. A distributed object model for the Java system. Computing Systems
, 9(4):265–290, Fall 1996.Google Scholar