Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

Provably-secure programming languages for remote evaluation

Published: 01 January 1997 Publication History

Abstract

Remote evaluation and dynamically-extensible systems pose serious safety and security risks. Programming language design has a major role in overcoming some of these risks. Important research areas include designing suitable languages for remote evaluation, identifying appropriate security and safety properties for them, and developing provably-sound logics for reasoning about the properties in the context of separate compilation and dynamic linking.

Cited By

View all
  • (1999)JFlowProceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages10.1145/292540.292561(228-241)Online publication date: 1-Jan-1999
  • (1999)Protecting privacy in a decentralized environmentProceedings DARPA Information Survivability Conference and Exposition. DISCEX'0010.1109/DISCEX.2000.825031(266-277)Online publication date: 1999
  • (1998)Complete, safe information flow with decentralized labelsProceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186)10.1109/SECPRI.1998.674834(186-197)Online publication date: 1998
  • Show More Cited By

Index Terms

  1. Provably-secure programming languages for remote evaluation

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM SIGPLAN Notices
      ACM SIGPLAN Notices  Volume 32, Issue 1
      Jan. 1997
      107 pages
      ISSN:0362-1340
      EISSN:1558-1160
      DOI:10.1145/251595
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 January 1997
      Published in SIGPLAN Volume 32, Issue 1

      Check for updates

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)42
      • Downloads (Last 6 weeks)9
      Reflects downloads up to 14 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (1999)JFlowProceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages10.1145/292540.292561(228-241)Online publication date: 1-Jan-1999
      • (1999)Protecting privacy in a decentralized environmentProceedings DARPA Information Survivability Conference and Exposition. DISCEX'0010.1109/DISCEX.2000.825031(266-277)Online publication date: 1999
      • (1998)Complete, safe information flow with decentralized labelsProceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186)10.1109/SECPRI.1998.674834(186-197)Online publication date: 1998
      • (1997)A decentralized model for information flow controlACM SIGOPS Operating Systems Review10.1145/269005.26666931:5(129-142)Online publication date: 1-Oct-1997
      • (1997)A decentralized model for information flow controlProceedings of the sixteenth ACM symposium on Operating systems principles10.1145/268998.266669(129-142)Online publication date: 1-Oct-1997

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media