3 results
Radha Jagadeesan ; Alan Jeffrey ; Corin Pitcher ; James Riely.
We study mechanisms that permit program components to express role constraints on clients, focusing on programmatic security mechanisms, which permit access controls to be expressed, in situ, as part of the code realizing basic functionality. In this setting, two questions immediately arise: (1) The […]
Published on January 9, 2008
Alan Jeffrey ; Julian Rathke.
The higher-order pi-calculus is an extension of the pi-calculus to allow communication of abstractions of processes rather than names alone. It has been studied intensively by Sangiorgi in his thesis where a characterisation of a contextual equivalence for higher-order pi-calculus is provided using […]
Published on April 21, 2005
Alan Jeffrey ; James Riely.
To model relaxed memory, we propose confusion-free event structures over an alphabet with a justification relation. Executions are modeled by justified configurations, where every read event has a justifying write event. Justification alone is too weak a criterion, since it allows cycles of the kind […]
Published on March 29, 2019