Distributed programming with distributed authorization, Proceedings of the 5th ACM SIGPLAN workshop on Types in language design and implementation, TLDI '10, 2010. ,
DOI : 10.1145/1708016.1708021
Type-checking zero-knowledge, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, 2008. ,
DOI : 10.1145/1455770.1455816
Refinement types for secure implementations, CSF, 2008. ,
DOI : 10.1145/1890028.1890031
URL : https://hal.archives-ouvertes.fr/hal-01294973
Coq'Art: Interactive Theorem Proving and Program Development, 2004. ,
URL : https://hal.archives-ouvertes.fr/hal-00344237
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions, 2009 22nd IEEE Computer Security Foundations Symposium, 2009. ,
DOI : 10.1109/CSF.2009.26
Modular verification of security protocol code by typing, POPL, 2010. ,
Verifying stateful programs with substructural state and hoare types, Proceedings of the 5th ACM workshop on Programming languages meets program verification, PLPV '11, 2011. ,
DOI : 10.1145/1929529.1929532
A linear logical framework, Inf. Comput, vol.179, issue.1, 2002. ,
Authorization in trust management, ACM Computing Surveys, vol.40, issue.3, 2008. ,
DOI : 10.1145/1380584.1380587
Type-preserving compilation of end-toend verification of security enforcement, PLDI '10, 2010. ,
Z3: An Efficient SMT Solver, TACAS, 2008. ,
DOI : 10.1007/978-3-540-78800-3_24
Dynamic multirole session types, POPL, 2011. ,
Research Report RR-6455 Authenticity by typing for security protocols, Journal of Computer Security, vol.11, issue.4, pp.451-520, 2003. ,
Verified Security for Browser Extensions, 2011 IEEE Symposium on Security and Privacy, 2011. ,
DOI : 10.1109/SP.2011.36
Reliable Evidence: Auditability by Typing, ESORICS, 2009. ,
DOI : 10.1016/S0140-3664(02)00049-X
Multiparty asynchronous session types, POPL, 2008. ,
Encoding information flow in aura, PLAS, 2009. ,
Aura: A programming language for authorization and audit, ICFP, 2008. ,
Fun with Type Functions, 2010. ,
DOI : 10.1007/978-1-84882-912-1_14
Linear maps. PLPV '11, 2011. ,
Privacy-friendly smart metering ,
Ott: Effective tool support for the working semanticist, JFP, vol.20, issue.1, 2010. ,
Subset Coercions in Coq, TYPES, 2007. ,
DOI : 10.1007/978-3-540-74464-1_16
URL : https://hal.archives-ouvertes.fr/inria-00628869
Fable: A Language for Enforcing User-defined Security Policies, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008. ,
DOI : 10.1109/SP.2008.29
Enforcing Stateful Authorization and Information Flow Policies in Fine, ESOP, 2010. ,
DOI : 10.1007/978-3-642-11957-6_28
Evidence-Based Audit, 2008 21st IEEE Computer Security Foundations Symposium, 2008. ,
DOI : 10.1109/CSF.2008.24
A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996. ,
DOI : 10.3233/JCS-1996-42-304