Secure composition of untrusted code: wrappers and causality types
- 7 November 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 22 references indexed in Scilit:
- An object calculus for asynchronous communicationPublished by Springer Nature ,2006
- Principals in programming languagesPublished by Association for Computing Machinery (ACM) ,1999
- Type-safe linking and modular assembly languagePublished by Association for Computing Machinery (ACM) ,1999
- Confinement properties for programming languagesACM SIGACT News, 1998
- The SLam calculusPublished by Association for Computing Machinery (ACM) ,1998
- Security properties of typed appletsPublished by Association for Computing Machinery (ACM) ,1998
- From higher-order π-calculus to π-calculus in the presence of static operatorsPublished by Springer Nature ,1998
- Extensible security architectures for JavaPublished by Association for Computing Machinery (ACM) ,1997
- A network pumpIEEE Transactions on Software Engineering, 1996
- A sound type system for secure flow analysisJournal of Computer Security, 1996