Product programs and relational program logics
Saved in:
Published in | Journal of logical and algebraic methods in programming Vol. 85; no. 5; pp. 847 - 859 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
01.08.2016
|
Online Access | Get full text |
Cover
Loading…
Author | Barthe, Gilles Crespo, Juan Manuel Kunz, César |
---|---|
Author_xml | – sequence: 1 givenname: Gilles surname: Barthe fullname: Barthe, Gilles – sequence: 2 givenname: Juan Manuel surname: Crespo fullname: Crespo, Juan Manuel – sequence: 3 givenname: César surname: Kunz fullname: Kunz, César |
BookMark | eNp9j71OwzAQgD0UiVL6BCx5gZjz2UnsEVX8SZVggNkyjlMlcuLIDgNvj1tgYeh0v9-dviuymsLkCLlhQBmw-naggzfjTDEXFCoKIFZkjbzCEhHkJdmmNADkqWwkZ2tCX2NoP-1SzDEcohlTYaa2iM6bpQ-T8X_9wodDb9M1ueiMT277Gzfk_eH-bfdU7l8en3d3-9KiUEtpFROuzmlbV0ZWXdO0wnxUQioLKLhq8nOLVjKAWubdrkVUogFlOSLvHN8Q_nPXxpBSdJ2eYz-a-KUZ6KOpHvTJVB9NNVQ6m2ZK_aNsv5xElmh6f5b9BjBFXfk |
CitedBy_id | crossref_primary_10_1145_3656453 crossref_primary_10_1145_3551497 crossref_primary_10_3390_e21090885 crossref_primary_10_1016_j_jlamp_2023_100894 crossref_primary_10_1145_3093333_3009896 crossref_primary_10_1007_s10817_020_09548_x crossref_primary_10_1007_s10703_022_00404_9 crossref_primary_10_1109_TDSC_2024_3403653 crossref_primary_10_1145_3371072 crossref_primary_10_1016_j_jss_2023_111897 crossref_primary_10_1145_3434321 crossref_primary_10_1145_3276525 crossref_primary_10_4204_EPTCS_296_6 crossref_primary_10_1145_3571213 crossref_primary_10_1145_3360567 |
Cites_doi | 10.1002/stvr.1472 10.1016/j.entcs.2005.01.030 10.1145/357084.357088 10.1016/j.tcs.2006.12.036 10.1016/S0167-6423(99)00024-6 |
ContentType | Journal Article |
DBID | AAYXX CITATION |
DOI | 10.1016/j.jlamp.2016.05.004 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EndPage | 859 |
ExternalDocumentID | 10_1016_j_jlamp_2016_05_004 |
GroupedDBID | --M 0R~ 4.4 457 4G. 7-5 8P~ AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AATTM AAXKI AAXUO AAYFN AAYWO AAYXX ABBOA ABJNI ABMAC ABXDB ACDAQ ACGFS ACRLP ACVFH ADBBV ADCNI ADEZE ADVLN AEBSH AEIPS AEKER AENEX AEUPX AFJKZ AFPUW AFTJW AFXIZ AGCQF AGHFR AGRNS AGUBO AIALX AIEXJ AIGII AIIUN AIKHN AITUG AKBMS AKRWK AKYEP ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU AOUOD AXJTR BKOJK BLXMC BNPGV CITATION EBS EFJIC EJD FDB FIRID FYGXN GBLVA GBOLZ HZ~ KOM M41 O9- OAUVE RIG ROL SPC SPCBC SSH SSV SSZ T5K ~G- |
ID | FETCH-LOGICAL-c249t-c914e6249d65a85f77d4ab5489c024397783c2c810068914fd2294709c3223fe3 |
ISSN | 2352-2208 |
IngestDate | Thu Apr 24 22:56:55 EDT 2025 Tue Jul 01 00:37:50 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 5 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c249t-c914e6249d65a85f77d4ab5489c024397783c2c810068914fd2294709c3223fe3 |
PageCount | 13 |
ParticipantIDs | crossref_primary_10_1016_j_jlamp_2016_05_004 crossref_citationtrail_10_1016_j_jlamp_2016_05_004 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2016-08-00 |
PublicationDateYYYYMMDD | 2016-08-01 |
PublicationDate_xml | – month: 08 year: 2016 text: 2016-08-00 |
PublicationDecade | 2010 |
PublicationTitle | Journal of logical and algebraic methods in programming |
PublicationYear | 2016 |
References | Goguen (10.1016/j.jlamp.2016.05.004_br0230) 1982 Lahiri (10.1016/j.jlamp.2016.05.004_br0310) 2013 Barthe (10.1016/j.jlamp.2016.05.004_br0070) 2004 Zaks (10.1016/j.jlamp.2016.05.004_br0400) 2008; vol. 5014 Kovács (10.1016/j.jlamp.2016.05.004_br0280) 2013 Milushev (10.1016/j.jlamp.2016.05.004_br0330) 2013; vol. 8208 Dwork (10.1016/j.jlamp.2016.05.004_br0210) 2006; vol. 4052 Barthe (10.1016/j.jlamp.2016.05.004_br0060) 2013; vol. 7734 Barthe (10.1016/j.jlamp.2016.05.004_br0100) 2015 Clarkson (10.1016/j.jlamp.2016.05.004_br0180) 2008 Godlin (10.1016/j.jlamp.2016.05.004_br0220) 2013; 23 Amtoft (10.1016/j.jlamp.2016.05.004_br0010) 2006 Barthe (10.1016/j.jlamp.2016.05.004_br0120) 2012 Kundu (10.1016/j.jlamp.2016.05.004_br0290) 2009 Lahiri (10.1016/j.jlamp.2016.05.004_br0300) 2012; vol. 7358 Darvas (10.1016/j.jlamp.2016.05.004_br0190) 2005; vol. 3450 Barthe (10.1016/j.jlamp.2016.05.004_br0080) 2014 Barthe (10.1016/j.jlamp.2016.05.004_br0090) 2014 Hawblitzel (10.1016/j.jlamp.2016.05.004_br0250) 2014 Joshi (10.1016/j.jlamp.2016.05.004_br0270) 2000; 37 Dufay (10.1016/j.jlamp.2016.05.004_br0200) 2005; vol. 3632 Andrews (10.1016/j.jlamp.2016.05.004_br0020) 1980; 2 Necula (10.1016/j.jlamp.2016.05.004_br0340) 2000 Benton (10.1016/j.jlamp.2016.05.004_br0130) 2004 Barthe (10.1016/j.jlamp.2016.05.004_br0040) 2013 Logozzo (10.1016/j.jlamp.2016.05.004_br0320) 2014 Pnueli (10.1016/j.jlamp.2016.05.004_br0370) 1998; vol. 1384 Terauchi (10.1016/j.jlamp.2016.05.004_br0380) 2005; vol. 3672 Clarkson (10.1016/j.jlamp.2016.05.004_br0170) 2014; vol. 8414 Goldberg (10.1016/j.jlamp.2016.05.004_br0240) 2005; 132 Yang (10.1016/j.jlamp.2016.05.004_br0390) 2007; 375 Beringer (10.1016/j.jlamp.2016.05.004_br0150) 2007 Zuck (10.1016/j.jlamp.2016.05.004_br0410) 2003; 9 Beringer (10.1016/j.jlamp.2016.05.004_br0140) 2011; vol. 6898 Person (10.1016/j.jlamp.2016.05.004_br0360) 2008 Chaudhuri (10.1016/j.jlamp.2016.05.004_br0160) 2010 Partush (10.1016/j.jlamp.2016.05.004_br0350) 2014 Hawblitzel (10.1016/j.jlamp.2016.05.004_br0260) 2013 Barrett (10.1016/j.jlamp.2016.05.004_br0030) 2005; vol. 3576 Barthe (10.1016/j.jlamp.2016.05.004_br0050) 2011; vol. 6664 Barthe (10.1016/j.jlamp.2016.05.004_br0110) 2009 |
References_xml | – start-page: 90 year: 2009 ident: 10.1016/j.jlamp.2016.05.004_br0110 article-title: Formal certification of code-based cryptographic proofs – volume: 23 start-page: 241 issue: 3 year: 2013 ident: 10.1016/j.jlamp.2016.05.004_br0220 article-title: Regression verification: proving the equivalence of similar programs publication-title: Softw. Test. Verif. Reliab. doi: 10.1002/stvr.1472 – start-page: 57 year: 2010 ident: 10.1016/j.jlamp.2016.05.004_br0160 article-title: Continuity analysis of programs – volume: vol. 4052 start-page: 1 year: 2006 ident: 10.1016/j.jlamp.2016.05.004_br0210 article-title: Differential privacy – volume: 132 start-page: 53 issue: 1 year: 2005 ident: 10.1016/j.jlamp.2016.05.004_br0240 article-title: Into the loops: practical issues in translation validation for optimizing compilers publication-title: Electron. Notes Theor. Comput. Sci. doi: 10.1016/j.entcs.2005.01.030 – start-page: 411 year: 2014 ident: 10.1016/j.jlamp.2016.05.004_br0090 article-title: Proving differential privacy in hoare logic – start-page: 226 year: 2008 ident: 10.1016/j.jlamp.2016.05.004_br0360 article-title: Differential symbolic execution – volume: vol. 3450 start-page: 193 year: 2005 ident: 10.1016/j.jlamp.2016.05.004_br0190 article-title: A theorem proving approach to analysis of secure information flow – volume: vol. 8208 start-page: 247 year: 2013 ident: 10.1016/j.jlamp.2016.05.004_br0330 article-title: Incremental hyperproperty model checking via games – volume: vol. 6898 start-page: 39 year: 2011 ident: 10.1016/j.jlamp.2016.05.004_br0140 article-title: Relational decomposition – start-page: 211 year: 2013 ident: 10.1016/j.jlamp.2016.05.004_br0280 article-title: Relational abstract interpretation for the verification of 2-hypersafety properties – volume: vol. 8414 start-page: 265 year: 2014 ident: 10.1016/j.jlamp.2016.05.004_br0170 article-title: Temporal logics for hyperproperties – volume: vol. 3632 start-page: 116 year: 2005 ident: 10.1016/j.jlamp.2016.05.004_br0200 article-title: Privacy-sensitive information flow with JML – start-page: 14 year: 2004 ident: 10.1016/j.jlamp.2016.05.004_br0130 article-title: Simple relational correctness proofs for static analyses and program transformations – start-page: 83 year: 2000 ident: 10.1016/j.jlamp.2016.05.004_br0340 article-title: Translation validation for an optimizing compiler – volume: vol. 6664 start-page: 200 year: 2011 ident: 10.1016/j.jlamp.2016.05.004_br0050 article-title: Relational verification using product programs – start-page: 51 year: 2008 ident: 10.1016/j.jlamp.2016.05.004_br0180 article-title: Hyperproperties – volume: vol. 3576 start-page: 291 year: 2005 ident: 10.1016/j.jlamp.2016.05.004_br0030 article-title: Tvoc: a translation validator for optimizing compilers – volume: vol. 7358 start-page: 712 year: 2012 ident: 10.1016/j.jlamp.2016.05.004_br0300 article-title: SYMDIFF: a language-agnostic semantic diff tool for imperative programs – volume: 2 start-page: 56 issue: 1 year: 1980 ident: 10.1016/j.jlamp.2016.05.004_br0020 article-title: An axiomatic approach to information flow in programs publication-title: ACM Trans. Program. Lang. Syst. doi: 10.1145/357084.357088 – start-page: 345 year: 2013 ident: 10.1016/j.jlamp.2016.05.004_br0310 article-title: Differential assertion checking – start-page: 233 year: 2007 ident: 10.1016/j.jlamp.2016.05.004_br0150 article-title: Secure information flow and program logics – volume: vol. 1384 start-page: 151 year: 1998 ident: 10.1016/j.jlamp.2016.05.004_br0370 article-title: Translation validation – start-page: 191 year: 2013 ident: 10.1016/j.jlamp.2016.05.004_br0260 article-title: Will you still compile me tomorrow? Static cross-version compiler validation – volume: 375 start-page: 308 issue: 1–3 year: 2007 ident: 10.1016/j.jlamp.2016.05.004_br0390 article-title: Relational separation logic publication-title: Theor. Comput. Sci. doi: 10.1016/j.tcs.2006.12.036 – volume: vol. 5014 start-page: 35 year: 2008 ident: 10.1016/j.jlamp.2016.05.004_br0400 article-title: CoVaC: compiler validation by program analysis of the cross-product – volume: 9 start-page: 223 issue: 3 year: 2003 ident: 10.1016/j.jlamp.2016.05.004_br0410 article-title: VOC: a methodology for the translation validation of optimizing compilers publication-title: J. Univers. Comput. Sci. – start-page: 32 year: 2014 ident: 10.1016/j.jlamp.2016.05.004_br0320 article-title: Verification modulo versions: towards usable verification – volume: vol. 3672 start-page: 352 year: 2005 ident: 10.1016/j.jlamp.2016.05.004_br0380 article-title: Secure information flow as a safety problem – start-page: 165 year: 2014 ident: 10.1016/j.jlamp.2016.05.004_br0250 article-title: Ironclad apps: end-to-end security via automated full-system verification – start-page: 327 year: 2009 ident: 10.1016/j.jlamp.2016.05.004_br0290 article-title: Proving optimizations correct using parameterized program equivalence – start-page: 91 year: 2006 ident: 10.1016/j.jlamp.2016.05.004_br0010 article-title: A logic for information flow in object-oriented programs – start-page: 193 year: 2014 ident: 10.1016/j.jlamp.2016.05.004_br0080 article-title: Probabilistic relational verification for cryptographic implementations – start-page: 11 year: 1982 ident: 10.1016/j.jlamp.2016.05.004_br0230 article-title: Security policies and security models – start-page: 123 year: 2013 ident: 10.1016/j.jlamp.2016.05.004_br0040 article-title: From relational verification to SIMD loop synthesis – start-page: 811 year: 2014 ident: 10.1016/j.jlamp.2016.05.004_br0350 article-title: Abstract semantic differencing via speculative correlation – start-page: 97 year: 2012 ident: 10.1016/j.jlamp.2016.05.004_br0120 article-title: Probabilistic relational reasoning for differential privacy – volume: 37 start-page: 113 issue: 1–3 year: 2000 ident: 10.1016/j.jlamp.2016.05.004_br0270 article-title: A semantic approach to secure information flow publication-title: Sci. Comput. Program. doi: 10.1016/S0167-6423(99)00024-6 – volume: vol. 7734 start-page: 29 year: 2013 ident: 10.1016/j.jlamp.2016.05.004_br0060 article-title: Beyond 2-safety: asymmetric product programs for relational program verification – start-page: 100 year: 2004 ident: 10.1016/j.jlamp.2016.05.004_br0070 article-title: Secure information flow by self-composition – start-page: 55 year: 2015 ident: 10.1016/j.jlamp.2016.05.004_br0100 article-title: Higher-order approximate relational refinement types for mechanism design and differential privacy |
SSID | ssj0001687831 |
Score | 2.203048 |
SourceID | crossref |
SourceType | Enrichment Source Index Database |
StartPage | 847 |
Title | Product programs and relational program logics |
Volume | 85 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDI4Qu3DhjXirB27QaU3TR47TBBogTRw2abcqTTLENArqtgu_HufVlQ0Q41JVUWo1tWs7jv0ZoSvGc0rAkPp5KrkPFoL6jGrAS0x4KCSVUqN99uLugDwMo-FSdcksb_KPb-tK_sNVGAO-qirZNThbEYUBuAf-whU4DNc_8fjJwLW6JCsDt1za9DZVYmXGr7V-m_7ghzrlp1FbJ8_qIPmF287SJsncUHl1Rk7HPUtwHHVMXdUSVn55p1Qpt6baQ50CsWIuqxSOx3mho9Udczg_ZWU95BDEVcKb1UwYvDYf41ZaV6Om844Vl6imE1MDqenMqwEAX9HcJogwbo7hR1A4okGsEVVNb-KvONlL9qvKKnQJa-NME8kUkawVZRovtoFhHwGKsNG-f-z2FmG4OE1S3bWyWpTDptJZgCuvU_Nfao5IfxdtW855bSMOe2hDFvtox3Xn8KyyPkBNKx2ekw4POOwtpMONe0Y6DtHg7rbf6fq2O4bPYcs88zkNiIzhVsQRS6NRkgjCctiAUq5QJsGvT0OOeRqoKiCYOxIYU5K0KAcdHo5keIQ2i7dCHiOPwL6_xQKBGaUkFIIRQfEIKAtGk5DmJwi7NWfcQserDiaT7JdPfoJuqofeDXLKb9NP15t-hrYWknmONmflXF6AezjLLy2LPwFFOWRg |
linkProvider | Elsevier |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Product+programs+and+relational+program+logics&rft.jtitle=Journal+of+logical+and+algebraic+methods+in+programming&rft.au=Barthe%2C+Gilles&rft.au=Crespo%2C+Juan+Manuel&rft.au=Kunz%2C+C%C3%A9sar&rft.date=2016-08-01&rft.issn=2352-2208&rft.volume=85&rft.issue=5&rft.spage=847&rft.epage=859&rft_id=info:doi/10.1016%2Fj.jlamp.2016.05.004&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jlamp_2016_05_004 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2352-2208&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2352-2208&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2352-2208&client=summon |