|
Search the dblp DataBase
James Riely:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Radha Jagadeesan, Corin Pitcher, James Riely
Open bisimulation for aspects. [Citation Graph (0, 0)][DBLP] AOSD, 2007, pp:107-120 [Conf]
- Glenn Bruns, Radha Jagadeesan, Alan Jeffrey, James Riely
µABC: A Minimal Aspect Calculus. [Citation Graph (0, 0)][DBLP] CONCUR, 2004, pp:209-224 [Conf]
- Rance Cleaveland, James Riely
Testing-Based Abstractions for Value-Passing Systems. [Citation Graph (0, 0)][DBLP] CONCUR, 1994, pp:417-432 [Conf]
- Radha Jagadeesan, Alan Jeffrey, James Riely
A Calculus of Untyped Aspect-Oriented Programs. [Citation Graph (0, 0)][DBLP] ECOOP, 2003, pp:54-73 [Conf]
- Matthew Hennessy, James Riely
Type-Safe Execution of Mobile Agents in Anonymous Networks. [Citation Graph (0, 0)][DBLP] ECOOP Workshops, 1998, pp:304- [Conf]
- Matthew Hennessy, James Riely
Type-Safe Execution of Mobile Agents in Anonymous Networks. [Citation Graph (0, 0)][DBLP] Secure Internet Programming, 1999, pp:95-115 [Conf]
- Corin Pitcher, James Riely
Dynamic Policy Discovery with Remote Attestation. [Citation Graph (0, 0)][DBLP] FoSSaCS, 2006, pp:111-125 [Conf]
- Matthew Hennessy, James Riely
Information Flow vs. Resource Access in the Asynchronous Pi-Calculus. [Citation Graph (0, 0)][DBLP] ICALP, 2000, pp:415-427 [Conf]
- Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, James Riely
lambda-RBAC: Programming with Role-Based Access Control. [Citation Graph (0, 0)][DBLP] ICALP (2), 2006, pp:456-467 [Conf]
- James Riely, Matthew Hennessy
Distributed Processes and Location Failures (Extended Abstract). [Citation Graph (0, 0)][DBLP] ICALP, 1997, pp:471-481 [Conf]
- James Riely, Matthew Hennessy
A Typed Language for Distributed Mobile Processes (Extended Abstract). [Citation Graph (0, 0)][DBLP] POPL, 1998, pp:378-390 [Conf]
- James Riely, Matthew Hennessy
Trust and Partial Typing in Open Systems of Mobile Agents. [Citation Graph (0, 0)][DBLP] POPL, 1999, pp:93-104 [Conf]
- James Riely, Jan Prins
Flattening Is an Improvement. [Citation Graph (0, 0)][DBLP] SAS, 2000, pp:360-376 [Conf]
- Matthew Hennessy, James Riely
Resource Access Control in Systems of Mobile Agents. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 1998, v:16, n:3, pp:- [Journal]
- Matthew Hennessy, James Riely
Resource Access Control in Systems of Mobile Agents. [Citation Graph (0, 0)][DBLP] Inf. Comput., 2002, v:173, n:1, pp:82-120 [Journal]
- James Riely, Matthew Hennessy
Trust and Partial Typing in Open Systems of Mobile Agents. [Citation Graph (0, 0)][DBLP] J. Autom. Reasoning, 2003, v:31, n:3-4, pp:335-370 [Journal]
- Radha Jagadeesan, Alan Jeffrey, James Riely
Typed parametric polymorphism for aspects. [Citation Graph (0, 0)][DBLP] Sci. Comput. Program., 2006, v:63, n:3, pp:267-296 [Journal]
- James Riely, Matthew Hennessy
Distributed processes and location failures. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2001, v:266, n:1-2, pp:693-735 [Journal]
- Matthew Hennessy, James Riely
Information flow vs. resource access in the asynchronous pi-calculus. [Citation Graph (0, 0)][DBLP] ACM Trans. Program. Lang. Syst., 2002, v:24, n:5, pp:566-591 [Journal]
- Bin Zhang, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher
Specifications of a high-level conflict-free firewall policy language for multi-domain networks. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:185-194 [Conf]
Do As I SaY! Programmatic Access Control with Explicit Identities. [Citation Graph (, )][DBLP]
Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects (Extended Abstract). [Citation Graph (, )][DBLP]
Generative Operational Semantics for Relaxed Memory Models. [Citation Graph (, )][DBLP]
Towards a Theory of Accountability and Audit. [Citation Graph (, )][DBLP]
Reflections on Trust: Trust Assurance by Dynamic Discovery of Static Properties. [Citation Graph (, )][DBLP]
Access Control Based on Code Identity for Open Distributed Systems. [Citation Graph (, )][DBLP]
Typing for a minimal aspect language: preliminary report. [Citation Graph (, )][DBLP]
Lambda-RBAC: Programming with Role-Based Access Control [Citation Graph (, )][DBLP]
Search in 0.000secs, Finished in 0.002secs
|