User profiles for J. C. Mitchell

John C Mitchell

Professor of Computer Science, Stanford University
Verified email at Stanford.edu
Cited by 32357

Third-party web tracking: Policy and technology

JR Mayer, JC Mitchell - 2012 IEEE symposium on security and …, 2012 - ieeexplore.ieee.org
In the early days of the web, content was designed and hosted by a single person, group, or
organization. No longer. Webpages are increasingly composed of content from myriad …

Design of a role-based trust-management framework

N Li, JC Mitchell… - Proceedings 2002 IEEE …, 2002 - ieeexplore.ieee.org
We introduce the RT framework, a family of role-based trust management languages for
representing policies and credentials in distributed authorization. RT combines the strengths of …

[BOOK][B] Foundations for programming languages

JC Mitchell - 1996 - lix.polytechnique.fr
This book presents a framework for the analysis of syntactic, operational and semantic
properties of programming languages. The framework is based on a mathematical system called …

Automated analysis of cryptographic protocols using mur/spl phi

JC Mitchell, M Mitchell, U Stern - Proceedings. 1997 IEEE …, 1997 - ieeexplore.ieee.org
A methodology is presented for using a general-purpose state enumeration tool, Mur/spl phi/,
to analyze cryptographic and security-related protocols. We illustrate the feasibility of the …

Abstract types have existential type

JC Mitchell, GD Plotkin - ACM Transactions on Programming Languages …, 1988 - dl.acm.org
Abstract data type declarations appear in typed programming languages like Ada, Alphard,
CLU and ML. This form of declaration binds a list of identifiers to a type with associated …

[PDF][PDF] Client-side defense against web-based identity theft

N Teraguchi, JC Mitchell - Computer Science Department, Stanford …, 2004 - stanford.edu
Web spoofing is a significant problem involving fraudulent email and web sites that trick
unsuspecting users into revealing private information. We discuss some aspects of common …

Robust defenses for cross-site request forgery

A Barth, C Jackson, JC Mitchell - … of the 15th ACM conference on …, 2008 - dl.acm.org
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper,
we present a new variation on CSRF attacks, login CSRF, in which the attacker forges a …

Biological activities of sesquiterpene lactones

E Rodriguez, GHN Towers, JC Mitchell - Phytochemistry, 1976 - Elsevier
Sesquiterpene lactones are characteristic constituents of the Compositae but also occur
sporadically in other angiosperm families and even in some liverworts. These bitter substances …

Privacy and contextual integrity: Framework and applications

A Barth, A Datta, JC Mitchell… - 2006 IEEE symposium …, 2006 - ieeexplore.ieee.org
Contextual integrity is a conceptual framework for understanding privacy expectations and
their implications developed in the literature on law, public policy, and political philosophy. …

Social networks

JC Mitchell - Annual review of anthropology, 1974 - annualreviews.org
The idea of the social network is becoming increasingly popular among both social
anthropologists and sociologists as one way of understanding behavior, par ญ ticularly in larger …