Secrecy by typing in security protocols, Theoretical Aspects of Computer Software '97, pp.611-638, 1997. ,
DOI : 10.1007/BFb0014571
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.8514
A core calculus of dependency, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.147-160, 1999. ,
DOI : 10.1145/292540.292555
Reasoning about cryptographic protocols in the spi calculus, CONCUR'97: Concurrency Theory, pp.59-73, 1997. ,
DOI : 10.1007/3-540-63141-0_5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.49.8326
The SwitchWare active network architecture, IEEE Network, vol.12, issue.3, pp.29-36, 1998. ,
DOI : 10.1109/65.690959
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.5304
Security in Active Networks, Secure Internet Programming, 1999. ,
DOI : 10.1007/3-540-48749-2_20
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.6837
A security proof system for networks of communicating processes, 1993. ,
Security breaches in the JDK 1.1 beta2 security API. Dyade, 1997. ,
Email with a mind of its own: the Safe-Tcl language for enabled mail, IFIP International Working Conference on Upper Layer Protocols, Architectures and Applications, 1994. ,
Inheritance as implicit coercion, Information and Computation, vol.93, issue.1, pp.172-221, 1991. ,
DOI : 10.1016/0890-5401(91)90055-7
URL : http://doi.org/10.1016/0890-5401(91)90055-7
Hostile ActiveX control demonstrated, RISKS Forum, vol.18, issue.82, 1997. ,
An Extension of System F with Subtyping, Information and Computation, vol.109, issue.1-2, pp.4-56, 1994. ,
DOI : 10.1006/inco.1994.1013
Java security: Web browsers and beyond, Internet Besieged: Countering Cyberspace Scofflaws, pp.241-269, 1997. ,
A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-242, 1976. ,
DOI : 10.1145/360051.360056
Certification of programs for secure information flow, Communications of the ACM, vol.20, issue.7, pp.504-513, 1977. ,
DOI : 10.1145/359636.359712
Java is type safe ??? Probably, Proc. 11th European Conference on Object Oriented Programming, pp.389-418, 1997. ,
DOI : 10.1007/BFb0053388
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.352.5159
Security reference model for the Java Developer's Kit 1.0.2, JavaSoft, 1996. ,
A type system for object initialization in the Java bytecode language, Object-Oriented Programming Systems, pp.310-327, 1998. ,
Java security architecture (JDK1.2) JavaSoft, http://java.sun.com/ products/jdk/1.2/docs/guide/security/spec/security-spec.doc.html, 1998. ,
DOI : 10.1145/2030256.2034639
The Java language environment ? a white paper, JavaSoft, 1996. ,
The SLam calculus, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.365-377, 1998. ,
DOI : 10.1145/268946.268976
Java security bug (applets can load native methods), RISKS Forum, vol.17, issue.83, 1996. ,
Security and dynamic class loading in Java: a formalisation, Proceedings of the 1998 International Conference on Computer Languages (Cat. No.98CB36225), pp.4-15, 1998. ,
DOI : 10.1109/ICCL.1998.674152
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.303
Polymorphic typing of an algorithmic language, 1992. ,
URL : https://hal.archives-ouvertes.fr/inria-00077018
The Objective Caml system. Software and documentation available on the Web, 1996. ,
The definition of Standard ML (revised), 1997. ,
Abstract models of memory management, Proceedings of the seventh international conference on Functional programming languages and computer architecture , FPCA '95, pp.66-77, 1995. ,
DOI : 10.1145/224164.224182
Proof-carrying code, Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '97, pp.106-119, 1997. ,
DOI : 10.1145/263699.263712
Safe kernel extensions without run-time checking, Proc. Symp. Operating Systems Design and Implementation, pp.229-243, 1996. ,
DOI : 10.1145/248155.238781
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.6054
is type-safe---definitely, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.161-170, 1998. ,
DOI : 10.1145/268946.268960
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.2452
A type system equivalent to flow analysis, ACM Transactions on Programming Languages and Systems, vol.17, issue.4, pp.576-599, 1995. ,
DOI : 10.1145/210184.210187
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.3559
Trust in the ??-calculus, Journal of Functional Programming, vol.7, issue.6, pp.557-591, 1997. ,
DOI : 10.1007/3-540-60360-3_47
A structural approach to operational semantics, 1981. ,
A formal specification of a large subset of Java Virtual Machine instructions, Formal Syntax and Semantics of Java, 1998. ,
User-Defined Types and Procedural Data Structures as Complementary Approaches to Data Abstraction, Theoretical aspects of object-oriented programming, pp.13-23, 1994. ,
DOI : 10.1007/978-1-4612-6315-9_22
A Web navigator with applets in Caml, Proceedings of the 5th International World Wide Web Conference, pp.1365-1371, 1996. ,
DOI : 10.1016/0169-7552(96)00032-3
A type system for Java bytecode subroutines, 25th symposium Principles of Programming Languages, pp.149-160, 1998. ,
DOI : 10.1145/268946.268959
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.152.2904
Proving Java Type Soundness, 1997. ,
DOI : 10.1007/3-540-48737-9_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.622
The Type and Effect Discipline, Information and Computation, vol.111, issue.2, pp.245-296, 1994. ,
DOI : 10.1006/inco.1994.1046
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.54.5309
Type inference for polymorphic references. Information and Computation, 1990. ,
DOI : 10.1016/0890-5401(90)90018-d
URL : http://doi.org/10.1016/0890-5401(90)90018-d
A type-based approach to program security, Proceedings of TAPSOFT'97, Colloquium on Formal Approaches in Software Engineering, pp.607-621, 1997. ,
DOI : 10.1007/BFb0030629
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.152.7398
A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.1-21, 1996. ,
DOI : 10.3233/JCS-1996-42-304
URL : http://doi.org/10.3233/jcs-1996-42-304
Extensible security architectures for Java, 1997. ,
DOI : 10.1145/268998.266668
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.33.9172
Understanding Java stack inspection, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), 1998. ,
DOI : 10.1109/SECPRI.1998.674823
Low level security in Java, Proceedings of the Fourth International World Wide Web Conference, pp.369-379, 1995. ,