{"id":"https://openalex.org/W2161011930","doi":"https://doi.org/10.1109/csf.2008.27","title":"Refinement Types for Secure Implementations","display_name":"Refinement Types for Secure Implementations","publication_year":2008,"publication_date":"2008-06-01","ids":{"openalex":"https://openalex.org/W2161011930","doi":"https://doi.org/10.1109/csf.2008.27","mag":"2161011930"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/csf.2008.27","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://uu.diva-portal.org/smash/get/diva2:214637/FULLTEXT01","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004557122","display_name":"Jesper Bengtson","orcid":null},"institutions":[{"id":"https://openalex.org/I123387679","display_name":"Uppsala University","ror":"https://ror.org/048a87296","country_code":"SE","type":"education","lineage":["https://openalex.org/I123387679"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Jesper Bengtson","raw_affiliation_strings":["University of Uppsala, Sweden"],"affiliations":[{"raw_affiliation_string":"University of Uppsala, Sweden","institution_ids":["https://openalex.org/I123387679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026297326","display_name":"Karthikeyan Bhargavan","orcid":"https://orcid.org/0000-0002-3152-8997"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Karthikeyan Bhargavan","raw_affiliation_strings":["Microsoft Research Limited, USA"],"affiliations":[{"raw_affiliation_string":"Microsoft Research Limited, USA","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108519702","display_name":"C\u00e9dric Fournet","orcid":"https://orcid.org/0000-0001-6929-886X"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"C\u00e9dric Fournet","raw_affiliation_strings":["Microsoft Research Limited, USA"],"affiliations":[{"raw_affiliation_string":"Microsoft Research Limited, USA","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102991861","display_name":"Andrew Gordon","orcid":"https://orcid.org/0000-0001-8330-7814"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Andrew D. Gordon","raw_affiliation_strings":["Microsoft Research Limited, USA"],"affiliations":[{"raw_affiliation_string":"Microsoft Research Limited, USA","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043151499","display_name":"Sergio Maffeis","orcid":"https://orcid.org/0000-0003-1514-6857"},"institutions":[{"id":"https://openalex.org/I185103710","display_name":"University of California, Santa Cruz","ror":"https://ror.org/03s65by71","country_code":"US","type":"education","lineage":["https://openalex.org/I185103710"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sergio Maffeis","raw_affiliation_strings":["University of California, Santa Cruz, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Santa Cruz, USA","institution_ids":["https://openalex.org/I185103710"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":11.946,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":84,"citation_normalized_percentile":{"value":0.912335,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"17","last_page":"32"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9903,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9894,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.51919997},{"id":"https://openalex.org/keywords/assertion","display_name":"Assertion","score":0.45952564}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8198091},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.6517924},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.64144033},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5833473},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.56097996},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.51919997},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.46602723},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45998496},{"id":"https://openalex.org/C40422974","wikidata":"https://www.wikidata.org/wiki/Q741248","display_name":"Assertion","level":2,"score":0.45952564},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.43125784},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.41476643},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20436004}],"mesh":[],"locations_count":7,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/csf.2008.27","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-102318","pdf_url":"https://uu.diva-portal.org/smash/get/diva2:214637/FULLTEXT01","source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"http://hdl.handle.net/10044/1/5707","pdf_url":"http://spiral.imperial.ac.uk/bitstream/10044/1/5707/1/refinement-types.pdf","source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01294973/file/refinement-types-for-secure-implementations-toplas11.pdf","pdf_url":"https://inria.hal.science/hal-01294973/file/refinement-types-for-secure-implementations-toplas11.pdf","source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://hal.inria.fr/hal-01294973","pdf_url":"https://inria.hal.science/hal-01294973/document","source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":["Centre National de la Recherche Scientifique"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://hal.inria.fr/hal-01294973/document","pdf_url":"https://hal.inria.fr/hal-01294973/document","source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://hal.inria.fr/hal-01294973/file/refinement-types-for-secure-implementations-toplas11.pdf","pdf_url":"https://hal.inria.fr/hal-01294973/file/refinement-types-for-secure-implementations-toplas11.pdf","source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-102318","pdf_url":"https://uu.diva-portal.org/smash/get/diva2:214637/FULLTEXT01","source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.58}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":81,"referenced_works":["https://openalex.org/W1487403858","https://openalex.org/W1511998399","https://openalex.org/W153174126","https://openalex.org/W1542335382","https://openalex.org/W1544662935","https://openalex.org/W1562901937","https://openalex.org/W1580328473","https://openalex.org/W1583630764","https://openalex.org/W1587012427","https://openalex.org/W1616718256","https://openalex.org/W168400685","https://openalex.org/W1703762240","https://openalex.org/W1741698332","https://openalex.org/W1817601911","https://openalex.org/W1888344413","https://openalex.org/W1959256509","https://openalex.org/W1966663897","https://openalex.org/W1973676520","https://openalex.org/W1975575519","https://openalex.org/W1975882289","https://openalex.org/W1986402635","https://openalex.org/W1987339920","https://openalex.org/W1991234099","https://openalex.org/W1991354622","https://openalex.org/W1993836075","https://openalex.org/W1994676271","https://openalex.org/W2005192022","https://openalex.org/W2017060815","https://openalex.org/W2025431400","https://openalex.org/W2029693536","https://openalex.org/W2044338429","https://openalex.org/W2052267638","https://openalex.org/W2055259417","https://openalex.org/W2055477538","https://openalex.org/W2061056245","https://openalex.org/W2063073904","https://openalex.org/W2072210640","https://openalex.org/W2073385346","https://openalex.org/W2095629885","https://openalex.org/W2095757617","https://openalex.org/W2096216741","https://openalex.org/W2096692976","https://openalex.org/W2097913369","https://openalex.org/W2101085206","https://openalex.org/W2104130981","https://openalex.org/W2108978217","https://openalex.org/W2109614775","https://openalex.org/W2112018008","https://openalex.org/W2114189125","https://openalex.org/W2115721302","https://openalex.org/W2117403024","https://openalex.org/W2123319381","https://openalex.org/W2123364806","https://openalex.org/W2126275975","https://openalex.org/W2127402358","https://openalex.org/W2128057448","https://openalex.org/W2128963089","https://openalex.org/W2134118306","https://openalex.org/W2135322712","https://openalex.org/W2136327713","https://openalex.org/W2136624255","https://openalex.org/W2146306932","https://openalex.org/W2146973388","https://openalex.org/W2148025199","https://openalex.org/W2152845220","https://openalex.org/W2154385894","https://openalex.org/W2155626861","https://openalex.org/W2156773905","https://openalex.org/W2157542076","https://openalex.org/W2158126684","https://openalex.org/W2168277905","https://openalex.org/W2170630946","https://openalex.org/W2171182387","https://openalex.org/W2174624365","https://openalex.org/W2176696677","https://openalex.org/W2295923951","https://openalex.org/W2568721247","https://openalex.org/W3022131440","https://openalex.org/W4235130846","https://openalex.org/W4237350695","https://openalex.org/W569543113"],"related_works":["https://openalex.org/W57958781","https://openalex.org/W4308361275","https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W2361781577","https://openalex.org/W2342603380","https://openalex.org/W2141019415","https://openalex.org/W1971522943","https://openalex.org/W1554274402","https://openalex.org/W1488313539"],"abstract_inverted_index":{"We":[0,43,97],"present":[1],"the":[2,14,53,80,106],"design":[3],"and":[4,20,38,48],"implementation":[5,73],"of":[6,13,17,101,113],"a":[7,29,65,99],"typechecker":[8,78],"for":[9,35,79],"verifying":[10],"security":[11,60],"properties":[12,112],"source":[15,119],"code":[16],"cryptographic":[18,46,114],"protocols":[19,115],"access":[21],"control":[22],"mechanisms.":[23],"The":[24,72],"underlying":[25],"type":[26,54],"theory":[27],"is":[28,105],"\u03bb-calculus":[30],"equipped":[31],"with":[32,62],"refinement":[33],"types":[34],"expressing":[36],"pre-":[37],"post-conditions":[39],"within":[40,52],"first-order":[41],"logic.":[42],"derive":[44],"formal":[45],"primitives":[47],"represent":[49],"active":[50],"adversaries":[51],"theory.":[55],"Well-typed":[56],"programs":[57],"enjoy":[58],"assertion-based":[59],"properties,":[61],"respect":[63],"to":[64,75,93,109],"realistic":[66],"threat":[67],"model":[68],"including":[69],"key":[70],"compromise.":[71],"amounts":[74],"an":[76,94],"enhanced":[77],"general":[81],"purpose":[82],"functional":[83],"language":[84],"F#;":[85],"typechecking":[86,117],"generates":[87],"verification":[88],"conditions":[89],"that":[90],"are":[91],"passed":[92],"SMT":[95],"solver.":[96],"describe":[98],"series":[100],"checked":[102],"examples.":[103],"This":[104],"first":[107],"tool":[108],"verify":[110],"authentication":[111],"by":[116],"their":[118],"code.":[120]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2161011930","counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":10}],"updated_date":"2024-12-10T11:29:51.639286","created_date":"2016-06-24"}