John C Mitchell
John C Mitchell
Professor of Computer Science, Stanford University
Verifierad e-postadress på Stanford.edu
TitelCiteras avÅr
Design of a role-based trust-management framework
N Li, JC Mitchell, WH Winsborough
Proceedings 2002 IEEE Symposium on Security and Privacy, 114-130, 2002
10252002
Architectural support for copy and tamper resistant software
D Lie, C Thekkath, M Mitchell, P Lincoln, D Boneh, J Mitchell, M Horowitz
Acm Sigplan Notices 35 (11), 168-177, 2000
8702000
Foundations for programming languages
JC Mitchell
MIT press 1, 2.1-7.1, 1996
8531996
Automated analysis of cryptographic protocols using Mur/spl phi
JC Mitchell, M Mitchell, U Stern
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
7251997
Abstract types have existential type
JC Mitchell, GD Plotkin
ACM Transactions on Programming Languages and Systems (TOPLAS) 10 (3), 470-502, 1988
6981988
Client-side defense against web-based identity theft
NCRLY Teraguchi, JC Mitchell
Computer Science Department, Stanford University. Available: http://crypto …, 2004
5812004
Distributed credential chain discovery in trust management
N Li, WH Winsborough, JC Mitchell
Journal of Computer Security 11 (1), 35-86, 2003
5452003
Robust defenses for cross-site request forgery
A Barth, C Jackson, JC Mitchell
Proceedings of the 15th ACM conference on Computer and communications …, 2008
5152008
Stronger Password Authentication Using Browser Extensions.
B Ross, C Jackson, N Miyake, D Boneh, JC Mitchell
USENIX Security Symposium, 17-32, 2005
4822005
Third-party web tracking: Policy and technology
JR Mayer, JC Mitchell
IEEE Symp Security and Privacy, 413-427, 2012
4812012
Privacy and contextual integrity: Framework and applications
A Barth, A Datta, JC Mitchell, H Nissenbaum
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-198, 2006
4402006
F-bounded polymorphism for object-oriented programming
P Canning, W Cook, W Hill, W Olthoff, JC Mitchell
Proceedings of the fourth international conference on Functional programming …, 1989
4011989
Type systems for programming languages
JC Mitchell
Formal Models and Semantics, 365-458, 1990
3781990
RT: A role-based trust-management framework
N Li, JC Mitchell
Proceedings DARPA Information Survivability Conference and Exposition 1, 201-212, 2003
3552003
A meta-notation for protocol analysis
I Cervesato, NA Durgin, PD Lincoln, JC Mitchell, A Scedrov
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 55-69, 1999
3531999
State of the art: Automated black-box web application vulnerability testing
J Bau, E Bursztein, D Gupta, JC Mitchell
IEEE Symposium on Security and Privacy, 332-345, 2010
3462010
Undecidability of bounded security protocol
NA Durgin
The 1999 Federated Logic Conference (FLoC'99), 1999
3381999
Decision problems for propositional linear logic
P Lincoln, J Mitchell, A Scedrov, N Shankar
Annals of pure and Applied Logic 56 (1-3), 239-311, 1992
3341992
Practical declarative network management
TL Hinrichs, NS Gude, M Casado, JC Mitchell, S Shenker
Proceedings of the 1st ACM workshop on Research on enterprise networking, 1-10, 2009
3222009
Datalog with Constraints: A Foundation for Trust Management Languages
N Li, JC Mitchell
International Symposium on Practical Aspects of Declarative Languages, 58-73, 2003
3092003
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20