Search the dblp DataBase
John C. Mitchell :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
John C. Mitchell The Implication Problem for Functional and Inclusion Dependencies [Citation Graph (13, 0)][DBLP ] Information and Control, 1983, v:56, n:3, pp:154-173 [Journal ] John C. Mitchell Inference Rules for Functional and Inclusion Dependencies. [Citation Graph (7, 12)][DBLP ] PODS, 1983, pp:58-69 [Conf ] Peter S. Canning , William R. Cook , Walter L. Hill , Walter G. Olthoff , John C. Mitchell F-Bounded Polymorphism for Object-Oriented Programming. [Citation Graph (6, 0)][DBLP ] FPCA, 1989, pp:273-280 [Conf ] Cynthia Dwork , Paris C. Kanellakis , John C. Mitchell On the Sequential Nature of Unification. [Citation Graph (6, 0)][DBLP ] J. Log. Program., 1984, v:1, n:1, pp:35-50 [Journal ] Lalita Jategaonkar , John C. Mitchell ML with Extended Pattern Matching and Subtypes. [Citation Graph (4, 0)][DBLP ] LISP and Functional Programming, 1988, pp:198-211 [Conf ] John C. Mitchell , Gordon D. Plotkin Abstract Types Have Existential Type. [Citation Graph (4, 0)][DBLP ] POPL, 1985, pp:37-51 [Conf ] Luca Cardelli , Simone Martini , John C. Mitchell , Andre Scedrov An Extension of System F with Subtyping. [Citation Graph (3, 0)][DBLP ] TACS, 1991, pp:750-770 [Conf ] John C. Mitchell , Gordon D. Plotkin Abstract Types Have Existential Type. [Citation Graph (3, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1988, v:10, n:3, pp:470-502 [Journal ] John C. Mitchell Toward a Typed Foundation for Method Specialization and Inheritance. [Citation Graph (2, 0)][DBLP ] POPL, 1990, pp:109-124 [Conf ] Paris C. Kanellakis , Harry G. Mairson , John C. Mitchell Unification and ML-Type Reconstruction. [Citation Graph (1, 0)][DBLP ] Computational Logic - Essays in Honor of Alan Robinson, 1991, pp:444-478 [Conf ] Luca Cardelli , John C. Mitchell Operations in Records. [Citation Graph (1, 0)][DBLP ] Category Theory and Computer Science, 1989, pp:75-81 [Conf ] My Hoang , John C. Mitchell , Ramesh Viswanathan Standard ML-NJ weak polymorphism and imperative constructs [Citation Graph (1, 0)][DBLP ] LICS, 1993, pp:15-25 [Conf ] John C. Mitchell , Furio Honsell , Kathleen Fisher A lambda calculus of objects and method specialization [Citation Graph (1, 0)][DBLP ] LICS, 1993, pp:26-38 [Conf ] Ole Agesen , Stephen N. Freund , John C. Mitchell Adding Type Parameterization to the Java Language. [Citation Graph (1, 0)][DBLP ] OOPSLA, 1997, pp:49-65 [Conf ] Paris C. Kanellakis , John C. Mitchell Polymorphic Unification and ML Typing. [Citation Graph (1, 0)][DBLP ] POPL, 1989, pp:105-115 [Conf ] John C. Mitchell Coercion and Type Inference. [Citation Graph (1, 0)][DBLP ] POPL, 1984, pp:175-185 [Conf ] John C. Mitchell Representation Independence and Data Abstraction. [Citation Graph (1, 0)][DBLP ] POPL, 1986, pp:263-276 [Conf ] John C. Mitchell , Robert Harper The Essence of ML. [Citation Graph (1, 0)][DBLP ] POPL, 1988, pp:28-46 [Conf ] Ninghui Li , John C. Mitchell , Derrick Tong Securing Java RMI-Based Distributed Applications. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:262-271 [Conf ] David Lie , Chandramohan A. Thekkath , Mark Mitchell , Patrick Lincoln , Dan Boneh , John C. Mitchell , Mark Horowitz Architectural Support for Copy and Tamper Resistant Software. [Citation Graph (0, 0)][DBLP ] ASPLOS, 2000, pp:168-177 [Conf ] John C. Mitchell Finite-State Analysis of Security Protocols. [Citation Graph (0, 0)][DBLP ] CAV, 1998, pp:71-76 [Conf ] Michael Backes , Catherine Meadows , John C. Mitchell Relating cryptography and formal methods: a panel. [Citation Graph (0, 0)][DBLP ] FMSE, 2003, pp:61-66 [Conf ] Anupam Datta , Ante Derek , John C. Mitchell , Dusko Pavlovic Secure protocol composition. [Citation Graph (0, 0)][DBLP ] FMSE, 2003, pp:11-23 [Conf ] Changhua He , Mukund Sundararajan , Anupam Datta , Ante Derek , John C. Mitchell A modular correctness proof of IEEE 802.11i and TLS. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:2-15 [Conf ] Ninghui Li , William H. Winsborough , John C. Mitchell Distributed credential chain discovery in trust management: extended abstract. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:156-165 [Conf ] Patrick Lincoln , John C. Mitchell , Mark Mitchell , Andre Scedrov A Probabilistic Poly-Time Framework for Protocol Analysis. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1998, pp:112-121 [Conf ] Rohit Chadha , John C. Mitchell , Andre Scedrov , Vitaly Shmatikov Contract Signing, Optimism, and Advantage. [Citation Graph (0, 0)][DBLP ] CONCUR, 2003, pp:361-377 [Conf ] Paulo Mateus , John C. Mitchell , Andre Scedrov Composition of Cryptographic Protocols in a Probabilistic Polynomial-Time Process Calculus. [Citation Graph (0, 0)][DBLP ] CONCUR, 2003, pp:323-345 [Conf ] Stuart A. Kurtz , John C. Mitchell , Michael J. O'Donnell Connecting Formal Semantics to Constructive Intuitions. [Citation Graph (0, 0)][DBLP ] Constructivity in Computer Science, 1991, pp:1-21 [Conf ] Iliano Cervesato , Nancy A. Durgin , Patrick Lincoln , John C. Mitchell , Andre Scedrov A Meta-Notation for Protocol Analysis. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:55-69 [Conf ] Iliano Cervesato , Nancy A. Durgin , John C. Mitchell , Patrick Lincoln , Andre Scedrov Relating Strands and Multiset Rewriting for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:35-51 [Conf ] Anupam Datta , Ante Derek , John C. Mitchell , Dusko Pavlovic A Derivation System for Security Protocols and its Logical Formalization. [Citation Graph (0, 0)][DBLP ] CSFW, 2003, pp:109-125 [Conf ] Anupam Datta , Ante Derek , John C. Mitchell , Dusko Pavlovic Abstraction and Refinement in Protocol Derivation. [Citation Graph (0, 0)][DBLP ] CSFW, 2004, pp:30-0 [Conf ] Michael Backes , Anupam Datta , Ante Derek , John C. Mitchell , Mathieu Turuani Compositional Analysis of Contract Signing Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2005, pp:94-110 [Conf ] Nancy A. Durgin , John C. Mitchell , Dusko Pavlovic A Compositional Logic for Protocol Correctness. [Citation Graph (0, 0)][DBLP ] CSFW, 2001, pp:241-0 [Conf ] Ajay Chander , John C. Mitchell , Drew Dean A State-Transition Model of Trust Management and Access Control. [Citation Graph (0, 0)][DBLP ] CSFW, 2001, pp:27-43 [Conf ] Ninghui Li , John C. Mitchell Understanding SPKI/SDSI Using First-Order Logic. [Citation Graph (0, 0)][DBLP ] CSFW, 2003, pp:89-0 [Conf ] Anupam Datta , Ante Derek , John C. Mitchell , Bogdan Warinschi Computationally Sound Compositional Logic for Key Exchange Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2006, pp:321-334 [Conf ] John C. Mitchell , Andre Scedrov Notes on Sconing and Relators. [Citation Graph (0, 0)][DBLP ] CSL, 1992, pp:352-378 [Conf ] Ninghui Li , John C. Mitchell A Role-based Trust-management Framework. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:201-0 [Conf ] John C. Mitchell Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis. [Citation Graph (0, 0)][DBLP ] ESOP, 2001, pp:23-29 [Conf ] Vitaly Shmatikov , John C. Mitchell Analysis of Abuse-Free Contract Signing. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2000, pp:174-191 [Conf ] Kathleen Fisher , John C. Mitchell A Delegation-based Object Calculus with Subtying. [Citation Graph (0, 0)][DBLP ] FCT, 1995, pp:42-61 [Conf ] Patrick Lincoln , John C. Mitchell , Mark Mitchell , Andre Scedrov Probabilistic Polynomial-Time Equivalence and Security Analysis. [Citation Graph (0, 0)][DBLP ] World Congress on Formal Methods, 1999, pp:776-793 [Conf ] Patrick Lincoln , John C. Mitchell , Andre Scedrov , Natarajan Shankar Decision Problems for Propositional Linear Logic [Citation Graph (0, 0)][DBLP ] FOCS, 1990, pp:662-671 [Conf ] John C. Mitchell Semantic Models for Second-Order Lambda Calculus [Citation Graph (0, 0)][DBLP ] FOCS, 1984, pp:289-299 [Conf ] John C. Mitchell , Mark Mitchell , Andre Scedrov A Linguistic Characterization of Bounded Oracle Computation and Probabilistic Polynomial Time. [Citation Graph (0, 0)][DBLP ] FOCS, 1998, pp:725-733 [Conf ] Ajith Ramanathan , John C. Mitchell , Andre Scedrov , Vanessa Teague Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols. [Citation Graph (0, 0)][DBLP ] FoSSaCS, 2004, pp:468-483 [Conf ] Anupam Datta , Ante Derek , John C. Mitchell , Vitaly Shmatikov , Mathieu Turuani Probabilistic Polynomial-Time Semantics for a Protocol Security Logic. [Citation Graph (0, 0)][DBLP ] ICALP, 2005, pp:16-29 [Conf ] John C. Mitchell , Ramesh Viswanathan Effective Models of Polymorphism, Subtyping and Recursion (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ICALP, 1996, pp:170-181 [Conf ] Dinesh Katiyar , David C. Luckham , John C. Mitchell Polymorphism and Subtyping in Interfaces. [Citation Graph (0, 0)][DBLP ] Workshop on Interface Definition Languages, 1994, pp:22-34 [Conf ] Iliano Cervesato , Nancy A. Durgin , Patrick Lincoln , John C. Mitchell , Andre Scedrov A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP ] ISSS, 2002, pp:356-383 [Conf ] John C. Mitchell , Vanessa Teague Autonomous Nodes and Distributed Mechanisms. [Citation Graph (0, 0)][DBLP ] ISSS, 2002, pp:58-83 [Conf ] Ajay Chander , Drew Dean , John C. Mitchell A Distributed High Assurance Reference Monitor. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:231-244 [Conf ] Brian T. Howard , John C. Mitchell Operational and Axiomatic Semantics of PCF. [Citation Graph (0, 0)][DBLP ] LISP and Functional Programming, 1990, pp:298-306 [Conf ] John C. Mitchell A Type-Inference Approach to Reduction Properties and Semantics of Polymorphic Expressions (Summary). [Citation Graph (0, 0)][DBLP ] LISP and Functional Programming, 1986, pp:308-319 [Conf ] Adam Barth , John C. Mitchell Managing Digital Rights using Linear Logic. [Citation Graph (0, 0)][DBLP ] LICS, 2006, pp:127-136 [Conf ] Patrick Lincoln , John C. Mitchell Operational aspects of linear lambda calculus [Citation Graph (0, 0)][DBLP ] LICS, 1992, pp:235-246 [Conf ] John C. Mitchell , Eugenio Moggi Kripke-Style models for typed lambda calculus [Citation Graph (0, 0)][DBLP ] LICS, 1987, pp:303-314 [Conf ] John C. Mitchell , Ajith Ramanathan , Andre Scedrov , Vanessa Teague Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis. [Citation Graph (0, 0)][DBLP ] LICS, 2001, pp:3-8 [Conf ] John C. Mitchell , Albert R. Meyer Second-Order Logical Relations (Extended Abstract). [Citation Graph (0, 0)][DBLP ] Logic of Programs, 1985, pp:225-236 [Conf ] Luca Cardelli , John C. Mitchell Operations on Records. [Citation Graph (0, 0)][DBLP ] Mathematical Foundations of Programming Semantics, 1989, pp:22-52 [Conf ] Changhua He , John C. Mitchell Security Analysis and Improvements for IEEE 802.11i. [Citation Graph (0, 0)][DBLP ] NDSS, 2005, pp:- [Conf ] Neil Chou , Robert Ledesma , Yuka Teraguchi , John C. Mitchell Client-Side Defense Against Web-Based Identity Theft. [Citation Graph (0, 0)][DBLP ] NDSS, 2004, pp:- [Conf ] Vitaly Shmatikov , John C. Mitchell Analysis of a Fair Exchange Protocol. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] Stephen N. Freund , John C. Mitchell A Type System for Object Initialization in the Java Bytecode Language. [Citation Graph (0, 0)][DBLP ] OOPSLA, 1998, pp:310-327 [Conf ] Stephen N. Freund , John C. Mitchell A Formal Framework for the Java Bytecode Language and Verifier. [Citation Graph (0, 0)][DBLP ] OOPSLA, 1999, pp:147-166 [Conf ] Ninghui Li , John C. Mitchell DATALOG with Constraints: A Foundation for Trust Management Languages. [Citation Graph (0, 0)][DBLP ] PADL, 2003, pp:58-73 [Conf ] Kim B. Bruce , John C. Mitchell PER Models of Subtyping, Recursive Types and Higher-Order Polymorphism. [Citation Graph (0, 0)][DBLP ] POPL, 1992, pp:316-327 [Conf ] Robert Harper , John C. Mitchell , Eugenio Moggi Higher-Order Modules and the Phase Distinction. [Citation Graph (0, 0)][DBLP ] POPL, 1990, pp:341-354 [Conf ] My Hoang , John C. Mitchell Lower Bounds on Type Inference with Subtypes. [Citation Graph (0, 0)][DBLP ] POPL, 1995, pp:176-185 [Conf ] Dinesh Katiyar , David C. Luckham , John C. Mitchell A Type System for Prototyping Languages. [Citation Graph (0, 0)][DBLP ] POPL, 1994, pp:138-150 [Conf ] Patrick Lincoln , John C. Mitchell Algorithmic Aspects of Type Inference with Subtypes. [Citation Graph (0, 0)][DBLP ] POPL, 1992, pp:293-304 [Conf ] Albert R. Meyer , John C. Mitchell Axiomatic Definability and Completeness for Recursive Programs. [Citation Graph (0, 0)][DBLP ] POPL, 1982, pp:337-346 [Conf ] Albert R. Meyer , John C. Mitchell , Eugenio Moggi , Richard Statman Empty Types in Polymorphic Lambda Calculus. [Citation Graph (0, 0)][DBLP ] POPL, 1987, pp:253-262 [Conf ] John C. Mitchell Programming language methods in computer security. [Citation Graph (0, 0)][DBLP ] POPL, 2001, pp:1-3 [Conf ] John C. Mitchell , Sigurd Meldal , Neel Madhav An Extension of Standard ML Modules with Subtyping and Inheritance. [Citation Graph (0, 0)][DBLP ] POPL, 1991, pp:270-278 [Conf ] John C. Mitchell Security analysis of network protocols: logical and computational methods. [Citation Graph (0, 0)][DBLP ] PPDP, 2005, pp:151-152 [Conf ] John C. Mitchell Multiset Rewriting and Security Protocol Analysis. [Citation Graph (0, 0)][DBLP ] RTA, 2002, pp:19-22 [Conf ] Adam Barth , Anupam Datta , John C. Mitchell , Helen Nissenbaum Privacy and Contextual Integrity: Framework and Applications. [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:184-198 [Conf ] David Lie , John C. Mitchell , Chandramohan A. Thekkath , Mark Horowitz Specifying and Verifying Hardware for Tamper-Resistant Software. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2003, pp:166-0 [Conf ] Ninghui Li , William H. Winsborough , John C. Mitchell Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2003, pp:123-139 [Conf ] John C. Mitchell , Mark Mitchell , Ulrich Stern Automated analysis of cryptographic protocols using Mur-phi. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1997, pp:141-151 [Conf ] Ninghui Li , John C. Mitchell , William H. Winsborough Design of a Role-Based Trust-Management Framework. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:114-130 [Conf ] John C. Mitchell On Abstraction and the Expressive Power of Programming Languages. [Citation Graph (0, 0)][DBLP ] TACS, 1991, pp:290-310 [Conf ] Kathleen Fisher , John C. Mitchell Notes on Typed Object-Oriented Programming. [Citation Graph (0, 0)][DBLP ] TACS, 1994, pp:844-885 [Conf ] John C. Mitchell , Michael J. O'Donnell Realisability Semantics for Error-Tolerant Logics. [Citation Graph (0, 0)][DBLP ] TARK, 1986, pp:363-382 [Conf ] Anupam Datta , Ante Derek , John C. Mitchell , Ajith Ramanathan , Andre Scedrov Games and the Impossibility of Realizable Ideal Functionality. [Citation Graph (0, 0)][DBLP ] TCC, 2006, pp:360-379 [Conf ] Anupam Datta , Ralf Küsters , John C. Mitchell , Ajith Ramanathan On the Relationships Between Notions of Simulation-Based Security. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:476-494 [Conf ] Adam Barth , John C. Mitchell , Justin Rosenstein Conflict and combination in privacy policy languages. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:45-46 [Conf ] Changhua He , John C. Mitchell Analysis of the 802.11i 4-way handshake. [Citation Graph (0, 0)][DBLP ] Workshop on Wireless Security, 2004, pp:43-50 [Conf ] Collin Jackson , Andrew Bortz , Dan Boneh , John C. Mitchell Protecting browser state from web privacy attacks. [Citation Graph (0, 0)][DBLP ] WWW, 2006, pp:737-744 [Conf ] Collin Jackson , Andrew Bortz , Dan Boneh , John C. Mitchell Protecting browser state from web privacy attacks. [Citation Graph (0, 0)][DBLP ] WWW, 2006, pp:737-744 [Conf ] Patrick Lincoln , John C. Mitchell , Andre Scedrov , Natarajan Shankar Decision Problems for Propositional Linear Logic. [Citation Graph (0, 0)][DBLP ] Ann. Pure Appl. Logic, 1992, v:56, n:1-3, pp:239-311 [Journal ] John C. Mitchell , Eugenio Moggi Kripke-Style Models for Typed lambda Calculus. [Citation Graph (0, 0)][DBLP ] Ann. Pure Appl. Logic, 1991, v:51, n:1-2, pp:99-124 [Journal ] Patrick Lincoln , John C. Mitchell , Andre Scedrov Linear logic proof games and optimization. [Citation Graph (0, 0)][DBLP ] Bulletin of Symbolic Logic, 1996, v:2, n:3, pp:322-338 [Journal ] Carl A. Gunter , John C. Mitchell , David Notkin Strategic Directions in Software Engineering and Programming Languages. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1996, v:28, n:4, pp:727-737 [Journal ] Robert Harper , John C. Mitchell ML and Beyond. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1996, v:28, n:4es, pp:219- [Journal ] Viviana Bono , John C. Mitchell , Amit Patel , Vitaly Shmatikov A Core Calculus of Classes and Objects. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 1999, v:20, n:, pp:- [Journal ] Stephen N. Freund , John C. Mitchell A Type System For Object Initialization In the Java Bytecode Language. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 1997, v:10, n:, pp:- [Journal ] Patrick Lincoln , John C. Mitchell , Andre Scedrov The Complexity of Local Proof Search in Linear Logic. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 1996, v:3, n:, pp:- [Journal ] John C. Mitchell , Ajith Ramanathan , Andre Scedrov , Vanessa Teague A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols (Preliminary Report). [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2001, v:45, n:, pp:- [Journal ] Anupam Datta , Ante Derek , John C. Mitchell , Arnab Roy Protocol Composition Logic (PCL). [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:172, n:, pp:311-358 [Journal ] Lalita Jategaonkar , John C. Mitchell Type Inference with Extended Pattern Matching and Subtypes. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 1993, v:19, n:1/2, pp:127-165 [Journal ] Luca Cardelli , Simone Martini , John C. Mitchell , Andre Scedrov An Extension of System F with Subtyping [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1994, v:109, n:1/2, pp:4-56 [Journal ] Kim B. Bruce , Albert R. Meyer , John C. Mitchell The Semantics of Second-Order Lambda Calculus [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1990, v:85, n:1, pp:76-134 [Journal ] Albert R. Meyer , John C. Mitchell Termination Assertions for Recursive Programs: Completeness and Axiomatic Definability [Citation Graph (0, 0)][DBLP ] Information and Control, 1983, v:56, n:1/2, pp:112-138 [Journal ] John C. Mitchell Polymorphic Type Inference and Containment [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1988, v:76, n:2/3, pp:211-249 [Journal ] John C. Mitchell , Ramesh Viswanathan Standard ML-NJ Weak Polymorphism and Imperative Constructs. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1996, v:127, n:2, pp:102-116 [Journal ] Ninghui Li , John C. Mitchell Understanding SPKI/SDSI using first-order logic. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2006, v:5, n:1, pp:48-64 [Journal ] Robert Harper , John C. Mitchell Parametricity and Variants of Girard's J Operator. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1999, v:70, n:1, pp:1-5 [Journal ] Ninghui Li , John C. Mitchell , William H. Winsborough Beyond proof-of-compliance: security analysis in trust management. [Citation Graph (0, 0)][DBLP ] J. ACM, 2005, v:52, n:3, pp:474-514 [Journal ] Stephen N. Freund , John C. Mitchell A Type System for the Java Bytecode Language and Verifier. [Citation Graph (0, 0)][DBLP ] J. Autom. Reasoning, 2003, v:30, n:3-4, pp:271-321 [Journal ] Nancy A. Durgin , Patrick Lincoln , John C. Mitchell Multiset rewriting and the complexity of bounded security protocols. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2004, v:12, n:2, pp:247-311 [Journal ] Anupam Datta , Ante Derek , John C. Mitchell , Dusko Pavlovic A derivation system and compositional logic for security protocols. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:3, pp:423-482 [Journal ] Ninghui Li , William H. Winsborough , John C. Mitchell Distributed Credential Chain Discovery in Trust Management. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2003, v:11, n:1, pp:35-86 [Journal ] Ajay Chander , Drew Dean , John C. Mitchell Reconstructing Trust Management. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2004, v:12, n:1, pp:131-164 [Journal ] Nancy A. Durgin , John C. Mitchell , Dusko Pavlovic A Compositional Logic for Proving Security Properties of Protocols. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2003, v:11, n:4, pp:677-722 [Journal ] John C. Mitchell Type Inference With Simple Subtypes. [Citation Graph (0, 0)][DBLP ] J. Funct. Program., 1991, v:1, n:3, pp:245-285 [Journal ] Rohit Chadha , John C. Mitchell , Andre Scedrov , Vitaly Shmatikov Contract signing, optimism, and advantage. [Citation Graph (0, 0)][DBLP ] J. Log. Algebr. Program., 2005, v:64, n:2, pp:189-218 [Journal ] Luca Cardelli , John C. Mitchell Operations on Records. [Citation Graph (0, 0)][DBLP ] Mathematical Structures in Computer Science, 1991, v:1, n:1, pp:3-48 [Journal ] Kathleen Fisher , Furio Honsell , John C. Mitchell A lambda Calculus of Objects and Method Specialization. [Citation Graph (0, 0)][DBLP ] Nord. J. Comput., 1994, v:1, n:1, pp:3-37 [Journal ] John C. Mitchell On Abstraction and the Expressive Power of Programming Languages. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 1993, v:21, n:2, pp:141-163 [Journal ] Robert Harper , John C. Mitchell ML and Beyond. [Citation Graph (0, 0)][DBLP ] SIGPLAN Notices, 1997, v:32, n:1, pp:80-85 [Journal ] Mourad Debbabi , Nancy A. Durgin , Mohamed Mejri , John C. Mitchell Security by typing. [Citation Graph (0, 0)][DBLP ] STTT, 2003, v:4, n:4, pp:472-495 [Journal ] Kathleen Fisher , John C. Mitchell The Development of Type Systems for Object-Oriented Languages. [Citation Graph (0, 0)][DBLP ] TAPOS, 1995, v:1, n:3, pp:189-220 [Journal ] Kathleen Fisher , John C. Mitchell On the Relationship Between Classes, Objects, and Data Abstraction. [Citation Graph (0, 0)][DBLP ] TAPOS, 1998, v:4, n:1, pp:3-25 [Journal ] Michael Backes , Anupam Datta , Ante Derek , John C. Mitchell , Mathieu Turuani Compositional analysis of contract-signing protocols. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2006, v:367, n:1-2, pp:33-56 [Journal ] Patrick Lincoln , John C. Mitchell , Andre Scedrov Optimization Complexity of Linear Logic Proof Games. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1999, v:227, n:1-2, pp:299-331 [Journal ] John C. Mitchell , Ajith Ramanathan , Andre Scedrov , Vanessa Teague A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2006, v:353, n:1-3, pp:118-164 [Journal ] Vitaly Shmatikov , John C. Mitchell Finite-state analysis of two contract signing protocols. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2002, v:283, n:2, pp:419-450 [Journal ] Stephen N. Freund , John C. Mitchell The type system for object initializatiion in the Jave bytecode language. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1999, v:21, n:6, pp:1196-1250 [Journal ] Robert Harper , John C. Mitchell On the Type Structure of Standard ML. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1993, v:15, n:2, pp:211-252 [Journal ] Elizabeth Stinson , John C. Mitchell Characterizing Bots' Remote Control Behavior. [Citation Graph (0, 0)][DBLP ] DIMVA, 2007, pp:89-108 [Conf ] Arnab Roy , Anupam Datta , Ante Derek , John C. Mitchell Inductive Proofs of Computational Secrecy. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:219-234 [Conf ] Analysis of EAP-GPSK Authentication Protocol. [Citation Graph (, )][DBLP ] An Operational Semantics for JavaScript. [Citation Graph (, )][DBLP ] Secrecy Analysis in Protocol Composition Logic. [Citation Graph (, )][DBLP ] Robust defenses for cross-site request forgery. [Citation Graph (, )][DBLP ] Privacy and Utility in Business Processes. [Citation Graph (, )][DBLP ] Towards a Formal Foundation of Web Security. [Citation Graph (, )][DBLP ] Isolating JavaScript with Filters, Rewriting, and Wrappers. [Citation Graph (, )][DBLP ] A Learning-Based Approach to Reactive Security. [Citation Graph (, )][DBLP ] Enterprise privacy promises and enforcement. [Citation Graph (, )][DBLP ] A Layered Architecture for Detecting Malicious Behaviors. [Citation Graph (, )][DBLP ] Practical declarative network management. [Citation Graph (, )][DBLP ] How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation. [Citation Graph (, )][DBLP ] Object Capabilities and Isolation of Untrusted Web Applications. [Citation Graph (, )][DBLP ] State of the Art: Automated Black-Box Web Application Vulnerability Testing. [Citation Graph (, )][DBLP ] Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols. [Citation Graph (, )][DBLP ] A Formalization of HIPAA for a Medical Messaging System. [Citation Graph (, )][DBLP ] Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods. [Citation Graph (, )][DBLP ] Securing Frame Communication in Browsers. [Citation Graph (, )][DBLP ] Securing frame communication in browsers. [Citation Graph (, )][DBLP ] A Learning-Based Approach to Reactive Security [Citation Graph (, )][DBLP ] An Automated Approach for Proving PCL Invariants. [Citation Graph (, )][DBLP ] Search in 0.040secs, Finished in 0.051secs