Flow Caml in a Nutshell (2003)

by Vincent Simonet , Inria Rocquencourt
Venue:Proceedings of the first APPSEM-II workshop
Citations:50 - 0 self

Active Bibliography

The Flow Caml System version 1.00 Documentation and user’s manual – I An, Flow Caml - 2003
25 Constraint-Based Type Inference for Guarded Algebraic Data Types – Vincent Simonet, François Pottier - 2003
et calcul symbolique – Apport Technique Thme, Vincent Simonet, Vincent Simonet, Projet Cristal
2 Constraint-Based Secure Information Flow Inference For A Java-Like Language – Qi Sun, David A. Naumann, Anindya Banerjee
47 Implicit typing `a la ML for the join-calculus – Edric Fournet, Cosimo Laneve, Luc Maranget - 1997
Sn 0249-0803 – Apport Technique Thme, Vincent Simonet, Projet Cristal
221 Information flow inference for ML – François Pottier, Vincent Simonet
3 A separate compilation extension to Standard ML (working draft – David Swasey, Tom Murphy, Vii Karl Crary, Robert Harper - 2006
17 Type Inference with Structural Subtyping: A faithful formalization of an efficient constraint solver – Vincent Simonet, Inria Rocquencourt - 2003
3 Implicit Self-Adjusting Computation for Purely Functional Programs – Yan Chen, Joshua Dunfield, Matthew A. Hammer, Umut A. Acar
9 Type inference and informative error reporting for secure information flow – Zhenyue Deng, Geoffrey Smith - 2006
Combining Type-Based Analysis and . . . – Hiroshi Unno, Naoki Kobayashi, Akinori Yonezawa - 2006
4 Checking secure information flow in java bytecode by code transformation and standard bytecode verification – C. Bernardeschi, N. De Francesco, G. Lettieri, L. Martini
8 Combining type-based analysis and model checking for finding counterexamples against non-interference – Hiroshi Unno - 2006
Project-Team Gallium Programming languages, types, compilation and proofs – Paris Rocquencourt, Compcert C
END-TO-END INFORMATION FLOW SECURITY FOR JAVA by – Mark Andrew Thober, C Mark Andrew Thober - 2007
Securing Data at Java IO Boundaries – Scott F. Smith, Mark Thober
Language Based Information Routing Security: Policy Enforcement – George Oreku, Jianzhong Li, Fredrick Mtenzi - 2007
Modular Reasoning about . . . – Sruthi Bandhakavi - 2005