Safe, Untrusted Agents using Proof-Carrying Code (1998)

Cached

Download Links

by George C. Necula , Peter Lee
Venue:of Lecture Notes in Computer Science
Citations:32 - 3 self

Active Bibliography

1097 Proof-Carrying Code – George C. Necula - 1997
1 Implementing Certified Programming Language Tools Dependent Type Theory – Adam James Chlipala, Adam James Chlipala - 2007
17 Proof Generation in the Touchstone Theorem Prover – George C. Necula, Peter Lee - 2000
Appendix on Robustness of . . . – Stephen Calabrese, et al.
2 Automated Techniques for Provably Safe Mobile Code – Karl Crary , Robert Harper, Peter Lee, Frank Pfenning - 2000
Desiderata for Interactive Verification Systems – Konrad Slind, Christian Prehofer - 1994
Chapter 1 Knowledge Representation and Classical Logic – Edited F. Van Harmelen, V. Lifschitz, B. Porter, Vladimir Lifschitz, Leora Morgenstern, David Plaisted
47 Reasoning Theories - Towards an Architecture for Open Mechanized Reasoning Systems – Fausto Giunchiglia, Paolo Pecchiari, Carolyn Talcott - 1994
399 Safe Kernel Extensions Without Run-Time Checking – George C. Necula, Peter Lee
61 Efficient Representation and Validation of Proofs – George C. Necula, Peter Lee - 1998
141 Compiling with Proofs – George Ciprian Necula - 1998
3 Object-Level Substitution, Unification And Generalization In Meta-Logic – Chuck C. Liang - 1995
15 Techniques For Efficient Formal Verification Using Binary Decision Diagrams – Alan John Hu, David L. Dill, Vaughan R. Pratt - 1995
Project Description – We Propose To
5 Automated Techniques for Provably Safe Mobile Code – Christopher Colby, Karl Crary, Robert Harper, Peter Lee, Frank Pfenning - 2000
Computer Programming as Mathematics (Brief description of CL) – Ján Komara, Paul J. Voda
1. SOFTWARE AND HARDWARE CORRECTNESS – Dale Miller - 2013
3 Finding Unity in Computational Logic – Dale Miller
2 An interpretation of isabelle/hol in hol light – Sean Mclaughlin