John Stanford

Results: 648



#Item
281Computing / Constraint satisfaction / Constraint logic programming / Datalog / Relational model / Structure / Logic programming / Constraint / Local consistency / Constraint programming / Software engineering / Computer programming

Datalog with Constraints: A Foundation for Trust Management Languages Ninghui Li and John C. Mitchell Department of Computer Science, Stanford University Gates 4B, Stanford, CA {ninghui.li, jcm}@cs.stanford.ed

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2002-11-05 19:04:46
282Model theory / Well-formed formula / IP / Interpretation / Logic / Metalogic / Formal languages

Probabilistic polynomial-time semantics for a protocol security logic? Anupam Datta1 , Ante Derek1 , John C. Mitchell1 , Vitaly Shmatikov2 , and Mathieu Turuani3 1 2

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 01:05:08
283Communications protocol / Data transmission / Protocols / Public-key cryptography / Cryptographic protocols / Network protocols / Cryptography / Data / Information

Compositional Analysis of Contract Signing Protocols Michael Backes a , Anupam Datta b , Ante Derek b , John C. Mitchell b and Mathieu Turuani c a Saarland

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 01:01:14
284Commitment scheme / Advantage / Ciphertext indistinguishability / Secure multi-party computation / RSA / Semantic security / Cryptography / Cryptographic protocols / Universal composability

Games and the Impossibility of Realizable Ideal Functionality Anupam Datta1 , Ante Derek1 , John C. Mitchell1 , Ajith Ramanathan1 , and Andre Scedrov2 1

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 01:29:59
285Cross-platform software / Scripting languages / JavaScript / Eval / JSON / C / ECMAScript / Apply / Scope / Computing / Software engineering / Computer programming

Isolating JavaScript with Filters, Rewriting, and Wrappers Sergio Maffeis1 , John C. Mitchell2 , and Ankur Taly2 1 Imperial College London

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2009-07-03 21:08:08
286Opera Software / Web browsers / Password / Phishing / Anti-spam techniques / World Wide Web / Opera / Website / Internet fraud / Software / Computing / Spamming

Client-side defense against web-based identity theft Neil Chou Robert Ledesma Yuka Teraguchi John C. Mitchell Computer Science Department, Stanford University, Stanford CA 94305 {neilchou, led242, yukat, jcm}@stanford.ed

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2003-11-24 14:01:52
287Ciphertext indistinguishability / Public-key cryptography / Internet Key Exchange / Whitfield Diffie / Index of cryptography articles / Station-to-Station protocol / Cryptography / Cryptographic protocols / Diffie–Hellman key exchange

Formal Proofs of Cryptographic Security of Diffie-Hellman-based Protocols Arnab Roy1 , Anupam Datta2 , John C. Mitchell1 1 2

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-10-07 02:05:31
288Cross-platform software / JavaScript / Object-capability model / Heap / Constructor / C / Property / Futures and promises / Computing / Software engineering / Computer programming

Object Capabilities and Isolation of Untrusted Web Applications Sergio Maffeis Imperial College London John C. Mitchell Stanford University

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-09 17:40:17
289Computer security / Constraint programming / Datalog / Cryptography / Role-based access control / Credential / Digital credential / Trust negotiation / Constraint logic programming / Security / Identity management / Access control

RT : A Role-based Trust-management Framework∗ Ninghui Li John C. Mitchell Department of Computer Science, Stanford University Gates 4B, Stanford, CA {ninghui.li, mitchell}@cs.stanford.edu

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2003-11-04 15:32:03
290Scripting languages / Type theory / Cross-platform software / JavaScript / ECMAScript / Eval / Closure / Prototype-based programming / Caja project / Software engineering / Computing / Computer programming

Run-Time Enforcement of Secure JavaScript Subsets Sergio Maffeis Imperial College London John C. Mitchell

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2009-06-18 11:30:20
UPDATE