Efficient mining of iterative patterns for software specification discovery
Studies have shown that program comprehension takes up to 45% of software development
costs. Such high costs are caused by the lack-of documented specification and further …
costs. Such high costs are caused by the lack-of documented specification and further …
History effects and verification
This paper shows how type effect systems can be combined with model-checking
techniques to produce powerful, automatically verifiable program logics for higher-order …
techniques to produce powerful, automatically verifiable program logics for higher-order …
Types and trace effects of higher order programs
This paper shows how type effect systems can be combined with model-checking
techniques to produce powerful, automatically verifiable program logics for higher order …
techniques to produce powerful, automatically verifiable program logics for higher order …
History-based access control and secure information flow
This paper addresses the problem of static checking of programs to ensure that they satisfy
confidentiality policies in the presence of dynamic access control in the form of Abadi and …
confidentiality policies in the presence of dynamic access control in the form of Abadi and …
Local policies for resource usage analysis
M Bartoletti, P Degano, GL Ferrari… - ACM Transactions on …, 2009 - dl.acm.org
An extension of the λ-calculus is proposed, to study resource usage analysis and
verification. It features usage policies with a possibly nested, local scope, and dynamic …
verification. It features usage policies with a possibly nested, local scope, and dynamic …
Automated Temporal Verification for Algebraic Effects
Although effect handlers offer a versatile abstraction for user-defined effects, they produce
complex and less restricted execution traces due to the composable non-local control flow …
complex and less restricted execution traces due to the composable non-local control flow …
History-based access control with local policies
M Bartoletti, P Degano, GL Ferrari - … , FOSSACS 2005, Held as Part of the …, 2005 - Springer
An extension of the λ-calculus is proposed, to study history-based access control. It allows
for security policies with a possibly nested, local scope. We define a type and effect system …
for security policies with a possibly nested, local scope. We define a type and effect system …
Enforcing secure service composition
M Bartoletti, P Degano… - 18th IEEE Computer …, 2005 - ieeexplore.ieee.org
A static approach is proposed to study secure composition of software. We extend the/spl
lambda/-calculus with primitives for invoking services that respect given security …
lambda/-calculus with primitives for invoking services that respect given security …
Planning and verifying service composition
M Bartoletti, P Degano… - Journal of Computer …, 2009 - content.iospress.com
A static approach is proposed to study secure composition of services. We extend the λ-
calculus with primitives for selecting and invoking services that respect given security …
calculus with primitives for selecting and invoking services that respect given security …
Security Protocols: Principles and Calculi: Tutorial Notes
M Abadi - International School on Foundations of Security …, 2006 - Springer
This paper is a basic introduction to some of the main themes in the design and analysis of
security protocols. It includes a brief explanation of the principles of protocol design and of a …
security protocols. It includes a brief explanation of the principles of protocol design and of a …