Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Phantom types and subtyping., and . J. Funct. Program., 16 (6): 751-791 (2006)Aspects de la Programmation d'Applications Win32 avec un Langage Fonctionnel, , and . CoRR, (2004)The Design of a COM-Oriented Module System.. JMLC, volume 1897 of Lecture Notes in Computer Science, page 104-118. Springer, (2000)Reasoning about Dynamic Policies., and . FoSSaCS, volume 2987 of Lecture Notes in Computer Science, page 453-467. Springer, (2004)Alternative Logics: a book review: SIGACT news logic column 18.. SIGACT News, 38 (2): 75-86 (2007)Review of Communicating and mobile systems: the pi-calculus by Robin Silner.. SIGACT News, 31 (4): 24-26 (2000)Specifying confidentiality.. SIGACT News, 35 (4): 72-83 (2004)Evidence with Uncertain Likelihoods., and . CoRR, (2014)Validating a web service security abstraction by typing., and . Formal Aspects Comput., 17 (3): 277-318 (2005)TulaFale: A Security Tool for Web Services, , , and . CoRR, (2004)