Back to Results
First PageMeta Content
MIX / Computer programming / Computing / Software engineering / Models of computation / Pointer / Computer / Machine code


Micro-Policies Formally Verified, Tag-Based Security Monitors Arthur Azevedo de Amorim1,2 Maxime D´en`es1,2 Nick Giannarakis2,3,4 C˘at˘alin Hrit¸cu2 Benjamin C. Pierce1 Antal Spector-Zabusky1 Andrew Tolmach5 1
Add to Reading List

Document Date: 2015-05-18 15:05:49


Open Document

File Size: 420,93 KB

Share Result on Facebook

City

Paris / /

Company

sS sA / /

Facility

University of Pennsylvania / Portland State University / /

IndustryTerm

programmable hardware/software architecture / abthree monitor services / concrete processor / software mechanism / monitor services / conventional processor / software-defined concrete rules / energy usage / /

Organization

Portland State University / Programmable Unit for Metadata Processing / University of Pennsylvania / /

Position

application programmer / user-level programmer / software controller / micro-policy designer / writer / Coq proof assistant / programmer / /

ProgrammingLanguage

J / /

ProvinceOrState

Alaska / Saskatchewan / Pennsylvania / /

Technology

encryption / functional programming / simulation / Alpha processor / concrete processor / flow control / conventional processor / RISC processor / /

SocialTag