@article(AbadiBLP93, author = "M. Abadi and M. Burrows and B. W. Lampson and G. D. Plotkin", year = "1993", title = "A Calculus for Access Control in Distributed Systems", journal = "ACM Transactions on Programming Languages and Systems", volume = "15", number = "4", pages = "706--734", doi = "10.1145/155183.155225", ) @article(Ager05afunctional, author = "M. S. Ager and O. Danvy and J. Midtgaard", year = "2005", title = "A Functional Correspondence between Monadic Evaluators and Abstract Machines for Languages with Computational Effects", journal = "Theoretical Computer Science", volume = "342", pages = "4--28", doi = "10.1016/j.tcs.2005.06.008", ) @techreport(tr2001-1, author = "A. Banerjee and D. A. Naumann", year = "2001", title = "A Simple Semantics and Static Analysis for {J}ava Security", type = "Technical Report", number = "CS Report 2001-1", institution = "Stevens Institute of Technology", url = "http://www.cs.stevens-tech.edu/~naumann/tr2001.ps", ) @inproceedings(BanerjeeNaumann02a, author = "A. Banerjee and D. A. Naumann", year = "2002", title = "Representation Independence, Confinement and Access Control", booktitle = "ACM Symposium on Principles of Programming Languages", pages = "166--177", doi = "10.1145/503272.503289", ) @article(BanerjeeNaumann03b, author = "A. Banerjee and D. A. Naumann", year = "2005", title = "Stack-based Access Control for Secure Information Flow", journal = "Journal of Functional Programming", volume = "15", number = "2", pages = "131--177", doi = "10.1017/S0956796804005453", ) @inproceedings(BessonBFG04, author = "F. Besson and T. Blanc and C. Fournet and A. D. Gordon", year = "2004", title = "From Stack Inspection to Access Control: A Security Analysis for Libraries", booktitle = "Computer Security Foundations Workshop (CSFW)", pages = "61--75", doi = "10.1109/CSFW.2004.11", ) @article(BessonJM01, author = "F. Besson and T. P. Jensen and D. {Le M{\'e}tayer}", year = "2001", title = "Model Checking Security Properties of Control Flow Graphs", journal = "Journal of Computer Security", volume = "9", number = "3", pages = "217--250", ) @article(BessonLJ05, author = "F. Besson and T. de Grenier de Latour and T. P. Jensen", year = "2005", title = "Interfaces for Stack Inspection", journal = "Journal of Functional Programming", volume = "15", number = "2", pages = "179--217", doi = "10.1017/S0956796804005465", ) @inproceedings(CentonzeFP07, author = "P. Centonze and R. J. Flynn and M. Pistoia", year = "2007", title = "Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies", booktitle = "Computer Security Applications Conference {(ACSAC)}", pages = "292--303", doi = "10.1109/ACSAC.2007.14", ) @article(ClementsF04, author = "J. Clements and M. Felleisen", year = "2004", title = "A Tail-recursive Machine with Stack Inspection", journal = "ACM Transactions on Programming Languages and Systems", volume = "26", number = "6", pages = "1029--1052", doi = "10.1145/1034774.1034778", ) @article(FournetG03, author = "C. Fournet and A. D. Gordon", year = "2003", title = "Stack inspection: Theory and Variants", journal = "ACM Transactions on Programming Languages and Systems", volume = "25", number = "3", pages = "360--399", doi = "10.1145/641909.641912", ) @book(Gong99, author = "L. Gong", year = "1999", title = "Inside Java 2 Platform Security", publisher = "Addison-Wesley", ) @book(LaMacchiaEtal02, author = "B. A. LaMacchia and S. Lange and M. Lyons and R. Martin and K. T. Price", year = "2002", title = "{.NET} Framework Security", publisher = "Addison-Wesley", ) @inproceedings(PistoiaBanerjeeNaumann, author = "M. Pistoia and A. Banerjee and D. A. Naumann", year = "2007", title = "Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model", booktitle = "28th {IEEE} Symposium on Security and Privacy", pages = "149--163", doi = "10.1109/SP.2007.10", ) @article(PottierSS05, author = "F. Pottier and C. Skalka and S. Smith", year = "2005", title = "A Systematic Approach to Static Access Control", journal = "ACM Transactions on Programming Languages and Systems", volume = "27", number = "2", pages = "344--382", doi = "10.1145/1057387.1057392", ) @phdthesis(skalka:phd, author = "C. Skalka", year = "2002", title = "Types for Programming Language-Based Security", school = "The Johns Hopkins University", ) @inproceedings(SkalkaS:ICFP00, author = "C. Skalka and S. Smith", year = "2000", title = "Static Enforcement of Security with Types", booktitle = "International Conference on Functional Programming", pages = "34--45", doi = "10.1145/351240.351244", ) @article(skalkaSVh08, author = "C. Skalka and S. Smith and D. {Van Horn}", year = "2008", title = "Types and Trace Effects of Higher Order Programs", journal = "Journal of Functional Programming", volume = "18", number = "2", pages = "179--249", doi = "10.1017/S0956796807006466", ) @article(WallachAF00, author = "D. Wallach and A. Appel and E. Felten", year = "2000", title = "{SAFKASI}: A Security Mechanism for Language-based Systems", journal = "{ACM} Transactions on Software Engineering and Methodology", volume = "9", number = "4", pages = "341--378", doi = "10.1145/363516.363520", )