Introduction to set constraint-based program analysis, Science of Computer Programming, vol.35, issue.2-3, pp.79-111, 1999. ,
DOI : 10.1016/S0167-6423(99)00007-6
Static Analysis for Stack Inspection, Electronic Notes in Theoretical Computer Science, vol.54, 2001. ,
DOI : 10.1016/S1571-0661(04)00236-1
History-Based Access Control with Local Policies, Proceedings of the 8th International Conference on Foundations of Software Science and Computational Structures (FOSSACS 2005), pp.316-332, 2005. ,
DOI : 10.1007/978-3-540-31982-5_20
Interfaces for stack inspection, Journal of Functional Programming, vol.15, issue.2, pp.179-217, 2005. ,
DOI : 10.1017/S0956796804005465
A Formal Model of Access Control for Mobile Interactive Devices, Proceedings of the 11th European Symposium On Research In Computer Security (ESORICS'06), 2006. ,
DOI : 10.1007/11863908_8
URL : https://hal.archives-ouvertes.fr/inria-00083453
Model checking security properties of control flow graphs, Journal of Computer Security, vol.9, issue.3, pp.217-250, 2001. ,
DOI : 10.3233/JCS-2001-9303
Enforcing Resource Bounds via Static Verification of Dynamic Checks, Proceedings of the 14th European Symposium on Programming (ESOP 2005), pp.311-325, 2005. ,
DOI : 10.1007/978-3-540-31987-0_22
Extracting Control from Data: User Interfaces of MIDP Applications, In Trustworthy Global Computing Lecture Notes in Computer Science, vol.4912, 2007. ,
DOI : 10.1007/978-3-540-78663-4_5
Stack inspection: theory and variants, Proceedings of the 29th ACM Symposium on Principles of Programming Languages (POPL'02, 2002. ,
Resource Access Control in Systems of Mobile Agents, Information and Computation, vol.173, issue.1, pp.82-120, 2002. ,
DOI : 10.1006/inco.2001.3089
Resource usage analysis, Proceedings of the 29th ACM Symposium on Principles of Programming Languages (POPL'02), pp.331-342, 2002. ,
Verification of control flow based security properties, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), pp.89-103, 1999. ,
DOI : 10.1109/SECPRI.1999.766902
Accelerated Data-Flow Analysis, Proceedings of the 14th International Symposium on Static Analysis (SAS'2007), pp.184-199, 2007. ,
DOI : 10.1007/978-3-540-74061-2_12
URL : https://hal.archives-ouvertes.fr/hal-00346005
A resource allocation model for denial of service, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp.137-147, 1992. ,
DOI : 10.1109/RISP.1992.213265
Proof-carrying code, Proceedings of the 24th ACM Symposium on Principles of Programming Languages (POPL'97), pp.106-119, 1997. ,
Hanne Riis. Nielson, and Chris. Hankin. Principles of Program Analysis, 1999. ,
Bicolano ? Byte Code Language in Coq, 2006. ,
A systematic approach to static access control, Proceedings of the 10th European Symposium on Programming, pp.30-45, 2001. ,
DOI : 10.1145/1057387.1057392
The protection of information in computer systems, Proceedings of the IEEE, vol.63, issue.9, pp.1278-1308, 1975. ,
DOI : 10.1109/PROC.1975.9939
A class of polynomially solvable range constraints for interval analysis without widenings, Theoretical Computer Science, vol.345, issue.1, pp.122-138, 2005. ,
DOI : 10.1016/j.tcs.2005.07.035