F size Fine size A+, Benchmark A+ A- Pf+ Pf-Pf+ Pf+ ,
Refinement types for secure implementations, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-01294973
Coq'art: Interactive theorem proving and program development, 2004. ,
URL : https://hal.archives-ouvertes.fr/hal-00344237
Modular verification of security protocol code by typing, 2010. ,
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions, 2009 22nd IEEE Computer Security Foundations Symposium, 2009. ,
DOI : 10.1109/CSF.2009.26
Verifying stateful programs with substructural state and hoare types, Proceedings of the 5th ACM workshop on Programming languages meets program verification, PLPV '11, 2011. ,
DOI : 10.1145/1929529.1929532
A linear logical framework, Inf. comput, vol.179, issue.1, 2002. ,
Authorization in trust management, ACM Computing Surveys, vol.40, issue.3, 2008. ,
DOI : 10.1145/1380584.1380587
Type-preserving compilation of endto-end verification of security enforcement, 2010. ,
Z3: An Efficient SMT Solver, Tacas, 2008. ,
DOI : 10.1007/978-3-540-78800-3_24
Dynamic multirole session types, 2011. ,
The revised report on the syntactic theories of sequential control and state, Theoretical Computer Science, vol.103, issue.2, pp.235-271, 1992. ,
DOI : 10.1016/0304-3975(92)90014-7
A type discipline for authorization policies in distributed systems, Pages 31?45 of: 20th ieee computer security foundations symposium (csf'07), 2007. ,
Modular codebased cryptographic verification, Pages 341?350 of: Acm conference on computer and communications security, 2011. ,
DOI : 10.1145/2046707.2046746
URL : https://hal.archives-ouvertes.fr/inria-00614372
Fully abstract compilation to javascript, proceedings of the acm symposium on principles of programming languages (popl), 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00780803
Fully abstract compilation to javascript, proceedings of the acm symposium on principles of programming languages (popl), 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00780803
Authenticity by typing for security protocols, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.451-520, 2003. ,
DOI : 10.1109/CSFW.2001.930143
The Essence of JavaScript, 2010. ,
DOI : 10.1007/978-3-642-14107-2_7
Verified Security for Browser Extensions, 2011 IEEE Symposium on Security and Privacy, 2011. ,
DOI : 10.1109/SP.2011.36
Dkal: Distributed-knowledge authorization language. Pages 149?162 of: Csf, 2008. ,
Reliable Evidence: Auditability by Typing, Esorics, vol.25, issue.17, 2009. ,
DOI : 10.1016/S0140-3664(02)00049-X
Multiparty asynchronous session types, 2008. ,
dkal ?????????: Constructing Executable Specifications of Authorization Protocols, proceedings of the international symposium on engineering secure software and systems, 2013. ,
DOI : 10.1007/978-3-642-36563-8_10
Encoding information flow in aura, 2009. ,
Aura: A programming language for authorization and audit, 2008. ,
Equational reasoning about programs with general recursion and call-byvalue semantics. Pages 15?26 of: Proceedings of the sixth workshop on programming languages meets program verification, 2012. ,
Fun with Type Functions, 2010. ,
DOI : 10.1007/978-1-84882-912-1_14
Linear maps. PLPV '11, 2011. ,
Towards a Mathematical Science of Computation, 1962. ,
DOI : 10.1007/978-94-011-1793-7_2
Ynot: dependent types for imperative programs, 2008. ,
Towards a practical programming language based on dependent type theory, 2007. ,
2010 (nov) Privacy-friendly smart metering ,
Verification condition generation with the dijkstra state monad, 2012. ,
Ott: Effective tool support for the working semanticist, Jfp, vol.20, issue.1, 2010. ,
Selfcertification: Bootstrapping certified typechecekrs in f* with coq, proceedings of the acm symposium on principles of programming languages, 2012. ,
Fable: A Language for Enforcing User-defined Security Policies, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008. ,
DOI : 10.1109/SP.2008.29
Enforcing Stateful Authorization and Information Flow Policies in Fine, 2010. ,
DOI : 10.1007/978-3-642-11957-6_28
Secure distributed programming with value-dependent types. Pages 266?278 of: Chakravarty, Manuel M, Icfp, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00939188
A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996. ,
DOI : 10.3233/JCS-1996-42-304