| 1 |
T. Gilb and D. Graham. Software Inspection, chapter 19. Workingham: Addison-Wesley, 1993. |
미소장 |
| 2 |
Eunyoung Lee and Andrew W. Appel. Policy-enforced linking of untrusted components (extended abstract). In Proceedings of the 9th European Software Engineering Conference and the 10th ACM SIGSOFT International Symposium on the Foundations of Software Engineering, Helsinki, Finland, September 2003. |
미소장 |
| 3 |
K. Apt. Ten years of hoare's logic: A survey (part I). In ACM Transactions on Programming Languages and Systems, volume 3(4), pages 431-483, October 1981. |
미소장 |
| 4 |
A behavioral notion of subtyping  |
미소장 |
| 5 |
Amy Moormann Zaremski and Jeannette M. Wing. Specification matching of software components. ACM Trans. Softw. Eng. Methodol., 6(4):333-369, 1997. |
미소장 |
| 6 |
Jeannette M. Wing. Writing larch interface language specifications. ACM Trans. Program. Lang. Syst., 9(1):1-24, 1987. |
미소장 |
| 7 |
Eunyoung Lee. Secure Linking: a Logical Framework for Policy-Enforced Component Composition. Ph. D. thesis, Princeton University, 2004. |
미소장 |
| 8 |
Andrew W. Appel and Amy P. Felty. A semantic model of types and machine instructions for proof-carrying code. In POPL, pages 243-253, 2000. |
미소장 |
| 9 |
Andrew W. Appel. Foundational proof-carrying code. In 16th Annual IEEE Symposium on Logic in Computer Science, June 2001. |
미소장 |
| 10 |
Andrew W. Appel and Edward W. Felten. Proof-carrying authentication. In 6th ACM Conference on Computer and Communications Security, November 1999. |
미소장 |
| 11 |
Gary T. Leavens, Albert L. Baker, and Clyde Ruby. JML: A notation for detailed design, 1999. adapted from Behavioral specifications for Businesses and Systems, Haim Kilov, Bernhard Rumpe, and William Harvey (editors), Chapter 12, pages 175-188. |
미소장 |
| 12 |
Gary T. Leavens. Larch/C++ Reference Manual Version 5.14. |
미소장 |
| 13 |
K. Rustan, M. Leino, Greg Nelson, and James B. Saxe. ESC/Java User's Manual. Compaq Systems Research Center, October 2000. |
미소장 |
| 14 |
Microsoft. Signing and Checking code with Authenticode. http://msdn.microsoft.com/workshop/security/authcode/signing.asp. |
미소장 |
| 15 |
VeriSign. Code signing digital ids for sun java signing. Technical report, VeriSign, 2001. |
미소장 |
| 16 |
G. C. Necula. Proof-carrying code. In Proceedings of the 24th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Langauges (POPL '97), January 1997. |
미소장 |
| 17 |
G. C. Necula, S. McPeak, and W. Weimer. Ccured: Type-safe retrotting of legacy code. In Twenty-Ninth ACM Symposium on Principles of Programming Languages, Portland, OR, 2002. |
미소장 |
| 18 |
Neal Glew and Greg Morrisett. Type-safe linking and modular assembly language. In Conference Record of POPL 99: The 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Antonio, Texas, pages 250-261, New York, NY, 1999. |
미소장 |
| 19 |
Greg Morrisett, David Walker, Karl Crary, and Neal Glew. From system f to typed assembly language. In Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 85-97, 1998. |
미소장 |
| 20 |
Frank Pfenning and Carsten Schuurmann. Twelf User's Guide, Version 1.4, December 2002. |
미소장 |