2004
DOI: 10.1007/978-3-540-30477-7_8
|View full text |Cite
|
Sign up to set email alerts
|

History Effects and Verification

Abstract: This paper shows how type effect systems can be combined with model-checking techniques to produce powerful, automatically verifiable program logics for higher-order programs. The properties verified are based on the ordered sequence of events that occur during program execution-an event history. Our type and effect systems automatically infer conservative approximations of the event histories arising at run-time, and model-checking techniques are used to verify logical properties of these histories. Our langu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
95
0

Year Published

2004
2004
2022
2022

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 58 publications
(95 citation statements)
references
References 32 publications
0
95
0
Order By: Relevance
“…Skalka and Wang [39] introduced a trust but verify framework which is an access control system for web services, but they do not provide temporal reasoning for the verification of policies. By recording the sequence of program events in temporal order, Skalka and Smith [40] are able to verify the policies such as whether the events were happened in a reasonable order, but the mechanism does not support decoupling the model and the implementation. Other approaches [41,42] either do not have a formal model supporting them or are tightly coupled with implementations.…”
Section: Related Workmentioning
confidence: 99%
“…Skalka and Wang [39] introduced a trust but verify framework which is an access control system for web services, but they do not provide temporal reasoning for the verification of policies. By recording the sequence of program events in temporal order, Skalka and Smith [40] are able to verify the policies such as whether the events were happened in a reasonable order, but the mechanism does not support decoupling the model and the implementation. Other approaches [41,42] either do not have a formal model supporting them or are tightly coupled with implementations.…”
Section: Related Workmentioning
confidence: 99%
“…Resource usage analysis and similar analyses have recently been studied extensively, and a variety of methods from type systems to model checking have been proposed [5,6,7,11,1,17,24]. However, only a few of them deal with concurrent languages.…”
Section: Related Workmentioning
confidence: 99%
“…In addition to narrowly focused systems for verification of specific properties such as memory safety or stack inspection security, recent research has explored security paradigms for enforcing general classes of properties. One such paradigm comprises the class of properties of program event traces that can be expressed in temporal logics [35,32,23,5,20]. This paper establishes a foundation for automated verification of higher order programs in this paradigm, using type and effect analysis.…”
Section: Introductionmentioning
confidence: 99%
“…In [4], an analysis adapted from the one presented in this paper is used to enforce secure service composition. The history-based access control model of [1] can be implemented with event traces and checks [35], as can be the policies realizable in that model, e.g. sophisticated Chinese Wall policies [1].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation