User profiles for J. C. Mitchell
John C MitchellProfessor of Computer Science, Stanford University Verified email at Stanford.edu Cited by 32357 |
Third-party web tracking: Policy and technology
JR Mayer, JC Mitchell - 2012 IEEE symposium on security and …, 2012 - ieeexplore.ieee.org
In the early days of the web, content was designed and hosted by a single person, group, or
organization. No longer. Webpages are increasingly composed of content from myriad …
organization. No longer. Webpages are increasingly composed of content from myriad …
Design of a role-based trust-management framework
N Li, JC Mitchell… - Proceedings 2002 IEEE …, 2002 - ieeexplore.ieee.org
We introduce the RT framework, a family of role-based trust management languages for
representing policies and credentials in distributed authorization. RT combines the strengths of …
representing policies and credentials in distributed authorization. RT combines the strengths of …
[BOOK][B] Foundations for programming languages
JC Mitchell - 1996 - lix.polytechnique.fr
This book presents a framework for the analysis of syntactic, operational and semantic
properties of programming languages. The framework is based on a mathematical system called …
properties of programming languages. The framework is based on a mathematical system called …
Automated analysis of cryptographic protocols using mur/spl phi
JC Mitchell, M Mitchell, U Stern - Proceedings. 1997 IEEE …, 1997 - ieeexplore.ieee.org
A methodology is presented for using a general-purpose state enumeration tool, Mur/spl phi/,
to analyze cryptographic and security-related protocols. We illustrate the feasibility of the …
to analyze cryptographic and security-related protocols. We illustrate the feasibility of the …
Abstract types have existential type
JC Mitchell, GD Plotkin - ACM Transactions on Programming Languages …, 1988 - dl.acm.org
Abstract data type declarations appear in typed programming languages like Ada, Alphard,
CLU and ML. This form of declaration binds a list of identifiers to a type with associated …
CLU and ML. This form of declaration binds a list of identifiers to a type with associated …
[PDF][PDF] Client-side defense against web-based identity theft
N Teraguchi, JC Mitchell - Computer Science Department, Stanford …, 2004 - stanford.edu
Web spoofing is a significant problem involving fraudulent email and web sites that trick
unsuspecting users into revealing private information. We discuss some aspects of common …
unsuspecting users into revealing private information. We discuss some aspects of common …
Robust defenses for cross-site request forgery
A Barth, C Jackson, JC Mitchell - … of the 15th ACM conference on …, 2008 - dl.acm.org
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper,
we present a new variation on CSRF attacks, login CSRF, in which the attacker forges a …
we present a new variation on CSRF attacks, login CSRF, in which the attacker forges a …
Biological activities of sesquiterpene lactones
E Rodriguez, GHN Towers, JC Mitchell - Phytochemistry, 1976 - Elsevier
Sesquiterpene lactones are characteristic constituents of the Compositae but also occur
sporadically in other angiosperm families and even in some liverworts. These bitter substances …
sporadically in other angiosperm families and even in some liverworts. These bitter substances …
Privacy and contextual integrity: Framework and applications
A Barth, A Datta, JC Mitchell… - 2006 IEEE symposium …, 2006 - ieeexplore.ieee.org
Contextual integrity is a conceptual framework for understanding privacy expectations and
their implications developed in the literature on law, public policy, and political philosophy. …
their implications developed in the literature on law, public policy, and political philosophy. …
Social networks
JC Mitchell - Annual review of anthropology, 1974 - annualreviews.org
The idea of the social network is becoming increasingly popular among both social
anthropologists and sociologists as one way of understanding behavior, par ญ ticularly in larger …
anthropologists and sociologists as one way of understanding behavior, par ญ ticularly in larger …