Interfaces for stack inspection, Journal of Functional Programming, vol.15, issue.2, pp.179-217, 2005. ,
DOI : 10.1017/S0956796804005465
Model checking security properties of control flow graphs, Journal of Computer Security, vol.9, issue.3, pp.217-250, 2001. ,
DOI : 10.3233/JCS-2001-9303
Enforcing Resource Bounds via Static Verification of Dynamic Checks, Proceedings of the 14th European Symposium on Programming, pp.311-325, 2005. ,
DOI : 10.1007/978-3-540-31987-0_22
Stack inspection: theory and variants, Proceedings of the 29th ACM Symp. on Principles of Programming Languages (POPL'02, 2002. ,
Resource Access Control in Systems of Mobile Agents, Information and Computation, vol.173, issue.1, pp.82-120, 2002. ,
DOI : 10.1006/inco.2001.3089
Resource usage analysis, Proceedings of the 29th ACM Symp. on Principles of Programming Languages (POPL'02), pp.331-342, 2002. ,
DOI : 10.1145/1057387.1057390
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.1756
Verification of control flow based security properties, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), pp.89-103, 1999. ,
DOI : 10.1109/SECPRI.1999.766902
The octogon abstract domain, Proceedings of the 8th Working Conference On Reverse Engineering (WCRE 01), pp.310-320, 2001. ,
Proof-carrying code, Proceedings of the 24th ACM Symp. on Principles of Programming Languages (POPL'97), pp.106-119, 1997. ,
A systematic approach to static access control, Proceedings of the 10th European Symposium on Programming, pp.30-45, 2001. ,
DOI : 10.1145/1057387.1057392
The protection of information in computer systems, Proceedings of the IEEE, vol.63, issue.9, pp.1278-1308, 1975. ,
DOI : 10.1109/PROC.1975.9939
OLD resolution with tabulation, Proceedings on Third International Conference on Logic Programming, pp.84-98, 1986. ,
DOI : 10.1007/3-540-16492-8_66