Author of the publication

Formalizing Java-MaC.

, , , , and . RV@CAV, volume 89 of Electronic Notes in Theoretical Computer Science, page 171-190. Elsevier, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware-Enforced Comprehensive Memory Safety., , and . IEEE Micro, 33 (3): 38-47 (2013)Computation focusing., and . Proc. ACM Program. Lang., 4 (ICFP): 95:1-95:27 (2020)Choice Trees: Representing Nondeterministic, Recursive, and Impure Programs in Coq., , , , and . Proc. ACM Program. Lang., 7 (POPL): 1770-1800 (January 2023)Verifying dynamic race detection., , , and . CPP, page 151-163. ACM, (2017)Preserving Secrecy Under Refinement., , and . ICALP (2), volume 4052 of Lecture Notes in Computer Science, page 107-118. Springer, (2006)Principals in Programming Languages: A Syntactic Proof Technique., , and . ICFP, page 197-207. ACM, (1999)SIGPLAN Notices 34(9), September 1999.Generative type abstraction and type-level computation., , , and . POPL, page 227-240. ACM, (2011)A Design for a Security-Typed Language with Certificate-Based Declassification., and . ESOP, volume 3444 of Lecture Notes in Computer Science, page 279-294. Springer, (2005)Type-and-example-directed program synthesis., and . PLDI, page 619-630. ACM, (2015)Strong and Weak Policy Relations., , , and . POLICY, page 33-36. IEEE Computer Society, (2009)