Posts By: David Wagner
Date | Post | Topic |
10/28/2010 | Why focus on security models? | Comprehensive overview of security models? |
05/14/2010 | Is the problem well-motivated? | Means to Limit or Constrain Side Effects |
04/27/2010 | Some background reading | Capability-based security; how does it work? |
04/28/2010 | Some disagreement on a few points | Capability-based security; how does it work? |
04/28/2010 | Slides for my talk | Capability-based security; how does it work? |
04/22/2010 | There are plenty of | Seeking thoughtful criticisms of functional programming and languages |
05/08/2010 | "automatic" is important | On the (Alleged) Value of Proof for Assurance |
03/24/2010 | Advantages of purity - security | Advantages of Purity |
02/17/2010 | So Joe-E as it stands is one | Joe-E: A Security-Oriented Subset of Java |
02/17/2010 | JVM bytecodes are full of pitfalls | Joe-E: A Security-Oriented Subset of Java |
02/18/2010 | The system's gotta be usable for Java programmers | Joe-E: A Security-Oriented Subset of Java |
02/17/2010 | Joe-E doesn't have an extensive taming database | Joe-E: A Security-Oriented Subset of Java |
08/23/2009 | How to provide determinism in an imperative language | Why determinism matters in language design. |
08/24/2009 | Determinism != functional purity | Why determinism matters in language design. |
LtU Topic Index Sorted by Date | LtU Topic Index Sorted by Topic | LtU Index of Post Authors | Zipped LtU Archive |