Results 1 
5 of
5
Dynamics in ML
, 1993
"... Objects with dynamic types allow the integration of operations that essentially require runtime typechecking into staticallytyped languages. This article presents two extensions of the ML language with dynamics, based on our work on the CAML implementation of ML, and discusses their usefulness. ..."
Abstract

Cited by 62 (0 self)
 Add to MetaCart
Objects with dynamic types allow the integration of operations that essentially require runtime typechecking into staticallytyped languages. This article presents two extensions of the ML language with dynamics, based on our work on the CAML implementation of ML, and discusses their usefulness. The main novelty of this work is the combination of dynamics with polymorphism.
An Overview of Linear Logic Programming
 in Computational Logic
, 1985
"... Logic programming can be given a foundation in sequent calculus by viewing computation as the process of building a cutfree sequent proof bottomup. The first accounts of logic programming as proof search were given in classical and intuitionistic logic. Given that linear logic allows richer sequen ..."
Abstract

Cited by 11 (1 self)
 Add to MetaCart
Logic programming can be given a foundation in sequent calculus by viewing computation as the process of building a cutfree sequent proof bottomup. The first accounts of logic programming as proof search were given in classical and intuitionistic logic. Given that linear logic allows richer sequents and richer dynamics in the rewriting of sequents during proof search, it was inevitable that linear logic would be used to design new and more expressive logic programming languages. We overview how linear logic has been used to design such new languages and describe briefly some applications and implementation issues for them.
Extensions to Logic Programming Motivated by the Construction of a Generic Theorem Prover
 Extensions of Logic Programming: International Workshop, Tubingen FRG
, 1991
"... In this article, we discuss several possible extensions to traditional logic programming languages. The specic extensions proposed here fall into two categories: logical extensions and the addition of constructs to allow for increased control. There is a unifying theme to the proposed logical ext ..."
Abstract

Cited by 7 (0 self)
 Add to MetaCart
(Show Context)
In this article, we discuss several possible extensions to traditional logic programming languages. The specic extensions proposed here fall into two categories: logical extensions and the addition of constructs to allow for increased control. There is a unifying theme to the proposed logical extensions, which is the scoped introduction of extensions to a programming context. More specically these extensions are the ability to introduce variables whose scope is limited to the term in which they occur (i.e. bound variables within terms), the ability to introduce into a goal a fresh constant whose scope is limited to the derivation of that goal, and the ability to introduce into a goal a program clause whose scope, once again, is limited to the derivation of that goal. The purpose of the additions for increased control are to facilitate the raising and handling of failures, or exceptions. and continuation thereafter. To motivate these various extensions, we have repeatedl...
Encryption as an abstract datatype: An extended abstract
, 2003
"... At the DolevYao level of abstraction, security protocols can be specified using multisets rewriting. Such rewriting can be modeled naturally using proof search in linear logic. The linear logic setting also provides a simple mechanism for generating nonces and session and encryption keys via eigenv ..."
Abstract

Cited by 7 (2 self)
 Add to MetaCart
At the DolevYao level of abstraction, security protocols can be specified using multisets rewriting. Such rewriting can be modeled naturally using proof search in linear logic. The linear logic setting also provides a simple mechanism for generating nonces and session and encryption keys via eigenvariables. We illustrate several additional aspects of this direct encoding of protocols into logic. In particular, encrypted data can be seen naturally as an abstract datatype. Entailments between security protocols as linear logic theories can be surprisingly strong. We also illustrate how the wellknown connection in linear logic between bipolar formulas and general formulas can be used to show that the asynchronous model of communication given by multiset rewriting rules can be understood, more naturally as asynchronous process calculus (also represented directly as linear logic formulas). The familiar proof theoretic notion of interpolants can also serve to characterize communication between a role and its environment.
Specifying and Debugging Security Protocols in the hhf Fragment of Intuitionistic Logic
, 2000
"... We investigate the fragment of intuitionistic logic consisting of hereditary Harrop formulas [MNPS91] as a specification language for security protocols. In this setting, embedded implications and universal quantification provide a natural builtin mechanism to model the dynamics in the knowledge of ..."
Abstract
 Add to MetaCart
(Show Context)
We investigate the fragment of intuitionistic logic consisting of hereditary Harrop formulas [MNPS91] as a specification language for security protocols. In this setting, embedded implications and universal quantification provide a natural builtin mechanism to model the dynamics in the knowledge of the agents involved in a protocol. We take advantage of the system Prolog [NM88,NM99] in order to turn specifications in hereditary Harrop formulas into executable prototypes, ready to be debugged. To exploit these features, we select as main casestudy the wellknown NeedhamSchroeder protocol [NS78]. In this paper we report on the results of our experiments and we discuss potentially interesting directions of future research.