Abstract is missing.
- Computer Security from a Programming Language and Static Analysis PerspectiveXavier Leroy. 1-9 [doi]
- What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol AnalysisCatherine Meadows. 10-21 [doi]
- A Tail-Recursive Semantics for Stack InspectionsJohn Clements, Matthias Felleisen. 22-37 [doi]
- Flexible Models for Dynamic LinkingSophia Drossopoulou, Giovanni Lagorio, Susan Eisenbach. 38-53 [doi]
- Correction of Functional Logic ProgramsMaría Alpuente, Demis Ballis, Francisco J. Correa, Moreno Falaschi. 54-68 [doi]
- Approximate Pruning in Tabled Logic ProgrammingLuís Fernando Castro, David Scott Warren. 69-83 [doi]
- Goal-Independent Suspension Analysis for Logic Programs with Dynamic SchedulingSamir Genaim, Andy King. 84-98 [doi]
- Security Properties: Two Agents Are SufficientHubert Comon-Lundh, Véronique Cortier. 99-113 [doi]
- A Simple Language for Real-Time Cryptographic Protocol AnalysisRoberto Gorrieri, Enrico Locatelli, Fabio Martinelli. 114-128 [doi]
- Rule Formats for Non InterferenceSimone Tini. 129-143 [doi]
- On the Secure Implementation of Security ProtocolsPablo Giambiagi, Mads Dam. 144-158 [doi]
- Handling Encryption in an Analysis for Secure Information FlowPeeter Laud. 159-173 [doi]
- Using Controller-Synthesis Techniques to Build Property-Enforcing LayersKarine Altisen, Aurélie Clodic, Florence Maraninchi, Éric Rutten. 174-188 [doi]
- Automatic Software Model Checking Using CLPCormac Flanagan. 189-203 [doi]
- Verifying Temporal Heap Properties Specified via Evolution LogicEran Yahav, Thomas W. Reps, Shmuel Sagiv, Reinhard Wilhelm. 204-222 [doi]
- Correctness of Data Representations Involving Heap Data StructuresUday S. Reddy, Hongseok Yang. 223-237 [doi]
- Modeling Web InteractionsPaul T. Graunke, Robby Findler, Shriram Krishnamurthi, Matthias Felleisen. 238-252 [doi]
- Type Inference for a Distributed pi-CalculusCédric Lhoussaine. 253-268 [doi]
- Programming Type-Safe Program UpdatesMartin Erwig, Deling Ren. 269-283 [doi]
- Type Error Slicing in Implicitly Typed Higher-Order LanguagesChristian Haack, J. B. Wells. 284-301 [doi]
- Core Formal Molecular BiologyVincent Danos, Cosimo Laneve. 302-318 [doi]
- Requirements on the Execution of Kahn Process NetworksMarc Geilen, Twan Basten. 319-334 [doi]
- Tagging, Encoding, and Jones OptimalityOlivier Danvy, Pablo E. Martínez López. 335-347 [doi]
- The Rely-Guarantee Method in Isabelle/HOLLeonor Prensa Nieto. 348-362 [doi]
- Building Certified Libraries for PCC: Dynamic Storage AllocationDachuan Yu, Nadeem Abdul Hamid, Zhong Shao. 363-379 [doi]
- Finite Differencing of Logical Formulas for Static AnalysisThomas W. Reps, Shmuel Sagiv, Alexey Loginov. 380-398 [doi]
- Register Allocation by Proof TransformationAtsushi Ohori. 399-413 [doi]