Efficient mining of iterative patterns for software specification discovery

D Lo, SC Khoo, C Liu - Proceedings of the 13th ACM SIGKDD …, 2007 - dl.acm.org
Studies have shown that program comprehension takes up to 45% of software development
costs. Such high costs are caused by the lack-of documented specification and further …

History effects and verification

C Skalka, S Smith - Asian Symposium on Programming Languages and …, 2004 - Springer
This paper shows how type effect systems can be combined with model-checking
techniques to produce powerful, automatically verifiable program logics for higher-order …

Types and trace effects of higher order programs

C Skalka, S Smith, D Van Horn - Journal of Functional Programming, 2008 - cambridge.org
This paper shows how type effect systems can be combined with model-checking
techniques to produce powerful, automatically verifiable program logics for higher order …

History-based access control and secure information flow

A Banerjee, DA Naumann - … Workshop on Construction and Analysis of …, 2004 - Springer
This paper addresses the problem of static checking of programs to ensure that they satisfy
confidentiality policies in the presence of dynamic access control in the form of Abadi and …

Local policies for resource usage analysis

M Bartoletti, P Degano, GL Ferrari… - ACM Transactions on …, 2009 - dl.acm.org
An extension of the λ-calculus is proposed, to study resource usage analysis and
verification. It features usage policies with a possibly nested, local scope, and dynamic …

Automated Temporal Verification for Algebraic Effects

Y Song, D Foo, WN Chin - Asian Symposium on Programming Languages …, 2022 - Springer
Although effect handlers offer a versatile abstraction for user-defined effects, they produce
complex and less restricted execution traces due to the composable non-local control flow …

History-based access control with local policies

M Bartoletti, P Degano, GL Ferrari - … , FOSSACS 2005, Held as Part of the …, 2005 - Springer
An extension of the λ-calculus is proposed, to study history-based access control. It allows
for security policies with a possibly nested, local scope. We define a type and effect system …

Enforcing secure service composition

M Bartoletti, P Degano… - 18th IEEE Computer …, 2005 - ieeexplore.ieee.org
A static approach is proposed to study secure composition of software. We extend the/spl
lambda/-calculus with primitives for invoking services that respect given security …

Planning and verifying service composition

M Bartoletti, P Degano… - Journal of Computer …, 2009 - content.iospress.com
A static approach is proposed to study secure composition of services. We extend the λ-
calculus with primitives for selecting and invoking services that respect given security …

Security Protocols: Principles and Calculi: Tutorial Notes

M Abadi - International School on Foundations of Security …, 2006 - Springer
This paper is a basic introduction to some of the main themes in the design and analysis of
security protocols. It includes a brief explanation of the principles of protocol design and of a …