The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

James Riely: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Radha Jagadeesan, Corin Pitcher, James Riely
    Open bisimulation for aspects. [Citation Graph (0, 0)][DBLP]
    AOSD, 2007, pp:107-120 [Conf]
  2. Glenn Bruns, Radha Jagadeesan, Alan Jeffrey, James Riely
    µABC: A Minimal Aspect Calculus. [Citation Graph (0, 0)][DBLP]
    CONCUR, 2004, pp:209-224 [Conf]
  3. Rance Cleaveland, James Riely
    Testing-Based Abstractions for Value-Passing Systems. [Citation Graph (0, 0)][DBLP]
    CONCUR, 1994, pp:417-432 [Conf]
  4. Radha Jagadeesan, Alan Jeffrey, James Riely
    A Calculus of Untyped Aspect-Oriented Programs. [Citation Graph (0, 0)][DBLP]
    ECOOP, 2003, pp:54-73 [Conf]
  5. Matthew Hennessy, James Riely
    Type-Safe Execution of Mobile Agents in Anonymous Networks. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1998, pp:304- [Conf]
  6. Matthew Hennessy, James Riely
    Type-Safe Execution of Mobile Agents in Anonymous Networks. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:95-115 [Conf]
  7. Corin Pitcher, James Riely
    Dynamic Policy Discovery with Remote Attestation. [Citation Graph (0, 0)][DBLP]
    FoSSaCS, 2006, pp:111-125 [Conf]
  8. Matthew Hennessy, James Riely
    Information Flow vs. Resource Access in the Asynchronous Pi-Calculus. [Citation Graph (0, 0)][DBLP]
    ICALP, 2000, pp:415-427 [Conf]
  9. Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, James Riely
    lambda-RBAC: Programming with Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:456-467 [Conf]
  10. James Riely, Matthew Hennessy
    Distributed Processes and Location Failures (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ICALP, 1997, pp:471-481 [Conf]
  11. James Riely, Matthew Hennessy
    A Typed Language for Distributed Mobile Processes (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    POPL, 1998, pp:378-390 [Conf]
  12. James Riely, Matthew Hennessy
    Trust and Partial Typing in Open Systems of Mobile Agents. [Citation Graph (0, 0)][DBLP]
    POPL, 1999, pp:93-104 [Conf]
  13. James Riely, Jan Prins
    Flattening Is an Improvement. [Citation Graph (0, 0)][DBLP]
    SAS, 2000, pp:360-376 [Conf]
  14. Matthew Hennessy, James Riely
    Resource Access Control in Systems of Mobile Agents. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 1998, v:16, n:3, pp:- [Journal]
  15. Matthew Hennessy, James Riely
    Resource Access Control in Systems of Mobile Agents. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2002, v:173, n:1, pp:82-120 [Journal]
  16. James Riely, Matthew Hennessy
    Trust and Partial Typing in Open Systems of Mobile Agents. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 2003, v:31, n:3-4, pp:335-370 [Journal]
  17. Radha Jagadeesan, Alan Jeffrey, James Riely
    Typed parametric polymorphism for aspects. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2006, v:63, n:3, pp:267-296 [Journal]
  18. James Riely, Matthew Hennessy
    Distributed processes and location failures. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2001, v:266, n:1-2, pp:693-735 [Journal]
  19. Matthew Hennessy, James Riely
    Information flow vs. resource access in the asynchronous pi-calculus. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2002, v:24, n:5, pp:566-591 [Journal]
  20. Bin Zhang, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher
    Specifications of a high-level conflict-free firewall policy language for multi-domain networks. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:185-194 [Conf]

  21. Do As I SaY! Programmatic Access Control with Explicit Identities. [Citation Graph (, )][DBLP]


  22. Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects (Extended Abstract). [Citation Graph (, )][DBLP]


  23. Generative Operational Semantics for Relaxed Memory Models. [Citation Graph (, )][DBLP]


  24. Towards a Theory of Accountability and Audit. [Citation Graph (, )][DBLP]


  25. Reflections on Trust: Trust Assurance by Dynamic Discovery of Static Properties. [Citation Graph (, )][DBLP]


  26. Access Control Based on Code Identity for Open Distributed Systems. [Citation Graph (, )][DBLP]


  27. Typing for a minimal aspect language: preliminary report. [Citation Graph (, )][DBLP]


  28. Lambda-RBAC: Programming with Role-Based Access Control [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002