User profiles for John C. Mitchell

John C Mitchell

Professor of Computer Science, Stanford University
Verified email at Stanford.edu
Cited by 32286

Design of a role-based trust-management framework

N Li, JC Mitchell… - Proceedings 2002 IEEE …, 2002 - ieeexplore.ieee.org
We introduce the RT framework, a family of role-based trust management languages for
representing policies and credentials in distributed authorization. RT combines the strengths of …

[BOOK][B] Foundations for programming languages

JC Mitchell - 1996 - lix.polytechnique.fr
This book presents a framework for the analysis of syntactic, operational and semantic
properties of programming languages. The framework is based on a mathematical system called …

Automated analysis of cryptographic protocols using mur/spl phi

JC Mitchell, M Mitchell, U Stern - Proceedings. 1997 IEEE …, 1997 - ieeexplore.ieee.org
A methodology is presented for using a general-purpose state enumeration tool, Mur/spl phi/,
to analyze cryptographic and security-related protocols. We illustrate the feasibility of the …

Third-party web tracking: Policy and technology

JR Mayer, JC Mitchell - 2012 IEEE symposium on security and …, 2012 - ieeexplore.ieee.org
In the early days of the web, content was designed and hosted by a single person, group, or
organization. No longer. Webpages are increasingly composed of content from myriad …

Abstract types have existential type

JC Mitchell, GD Plotkin - ACM Transactions on Programming Languages …, 1988 - dl.acm.org
Abstract data type declarations appear in typed programming languages like Ada, Alphard,
CLU and ML. This form of declaration binds a list of identifiers to a type with associated …

Robust defenses for cross-site request forgery

A Barth, C Jackson, JC Mitchell - … of the 15th ACM conference on …, 2008 - dl.acm.org
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper,
we present a new variation on CSRF attacks, login CSRF, in which the attacker forges a …

[PDF][PDF] Client-side defense against web-based identity theft

N Teraguchi, JC Mitchell - Computer Science Department, Stanford …, 2004 - stanford.edu
Web spoofing is a significant problem involving fraudulent email and web sites that trick
unsuspecting users into revealing private information. We discuss some aspects of common …

[HTML][HTML] Stronger Password Authentication Using Browser Extensions.

…, C Jackson, N Miyake, D Boneh, JC Mitchell - USENIX Security …, 2005 - usenix.org
We describe a browser extension, PwdHash, that transparently produces a different password
for each site, improving web password security and defending against password phishing …

Privacy and contextual integrity: Framework and applications

A Barth, A Datta, JC Mitchell… - 2006 IEEE symposium …, 2006 - ieeexplore.ieee.org
Contextual integrity is a conceptual framework for understanding privacy expectations and
their implications developed in the literature on law, public policy, and political philosophy. …

Distributed credential chain discovery in trust management

N Li, WH Winsborough, JC Mitchell - … of the 8th ACM Conference on …, 2001 - dl.acm.org
We give goal-oriented algorithms for discovering credential chains in RT o , a role-based
trust-management language introduced in this paper. The algorithms search credential graphs, …