The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Steve Zdancewic: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
    Enforcing Robust Declassification. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:172-186 [Conf]
  2. Peng Li, Steve Zdancewic
    Practical Information-flow Control in Web-Based Information Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:2-15 [Conf]
  3. Steve Zdancewic, Andrew C. Myers
    Robust Declassification. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:15- [Conf]
  4. Steve Zdancewic, Andrew C. Myers
    Observational Determinism for Concurrent Program Security. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:29-0 [Conf]
  5. Nikhil Swamy, Michael Hicks, Stephen Tse, Steve Zdancewic
    Managing Policy Updates in Security-Typed Languages. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:202-216 [Conf]
  6. Peng Li, Steve Zdancewic
    Encoding Information Flow in Haskell. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:16- [Conf]
  7. Stephen Tse, Steve Zdancewic
    A Design for a Security-Typed Language with Certificate-Based Declassification. [Citation Graph (0, 0)][DBLP]
    ESOP, 2005, pp:279-294 [Conf]
  8. Steve Zdancewic, Andrew C. Myers
    Secure Information Flow and CPS. [Citation Graph (0, 0)][DBLP]
    ESOP, 2001, pp:46-61 [Conf]
  9. Rajeev Alur, Pavol Cerný, Steve Zdancewic
    Preserving Secrecy Under Refinement. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:107-118 [Conf]
  10. Stephen Tse, Steve Zdancewic
    Translating dependency into parametricity. [Citation Graph (0, 0)][DBLP]
    ICFP, 2004, pp:115-125 [Conf]
  11. David Walker, Steve Zdancewic, Jay Ligatti
    A theory of aspects. [Citation Graph (0, 0)][DBLP]
    ICFP, 2003, pp:127-139 [Conf]
  12. Steve Zdancewic, Dan Grossman, J. Gregory Morrisett
    Principals in Programming Languages: A Syntactic Proof Technique. [Citation Graph (0, 0)][DBLP]
    ICFP, 1999, pp:197-207 [Conf]
  13. Peng Li, Steve Zdancewic
    Advanced control flow in Java card programming. [Citation Graph (0, 0)][DBLP]
    LCTES, 2004, pp:165-174 [Conf]
  14. Peng Li, Steve Zdancewic
    Downgrading policies and relaxed noninterference. [Citation Graph (0, 0)][DBLP]
    POPL, 2005, pp:158-170 [Conf]
  15. Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers
    Untrusted Hosts and Confidentiality: Secure Program Partitioning. [Citation Graph (0, 0)][DBLP]
    SOSP, 2001, pp:1-14 [Conf]
  16. Stephen Tse, Steve Zdancewic
    Run-time Principals in Information-flow Type Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:179-193 [Conf]
  17. Lantian Zheng, Stephen Chong, Andrew C. Myers, Steve Zdancewic
    Using Replication and Partitioning to Build Secure Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:236-250 [Conf]
  18. Jeffrey A. Vaughan, Steve Zdancewic
    A Cryptographic Decentralized Label Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:192-206 [Conf]
  19. Brian E. Aydemir, Aaron Bohannon, Matthew Fairbairn, J. Nathan Foster, Benjamin C. Pierce, Peter Sewell, Dimitrios Vytiniotis, Geoffrey Washburn, Stephanie Weirich, Steve Zdancewic
    Mechanized Metatheory for the Masses: The PoplMark Challenge. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 2005, pp:50-65 [Conf]
  20. Usa Sammapun, Raman Sharykin, Margaret DeLap, Myong Kim, Steve Zdancewic
    Formalizing Java-MaC. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2003, v:89, n:2, pp:- [Journal]
  21. Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
    Enforcing Robust Declassification and Qualified Robustness. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2006, v:14, n:2, pp:157-196 [Journal]
  22. Steve Zdancewic, Andrew C. Myers
    Secure Information Flow via Linear Continuations. [Citation Graph (0, 0)][DBLP]
    Higher-Order and Symbolic Computation, 2002, v:15, n:2-3, pp:209-234 [Journal]
  23. Jay Ligatti, David Walker, Steve Zdancewic
    A type-theoretic interpretation of pointcuts and advice. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2006, v:63, n:3, pp:240-266 [Journal]
  24. Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers
    Secure program partitioning. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 2002, v:20, n:3, pp:283-328 [Journal]
  25. Dan Grossman, J. Gregory Morrisett, Steve Zdancewic
    Syntactic type abstraction. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2000, v:22, n:6, pp:1037-1080 [Journal]
  26. Peng Li, Steve Zdancewic
    Combining events and threads for scalable network services implementation and evaluation of monadic, application-level concurrency primitives. [Citation Graph (0, 0)][DBLP]
    PLDI, 2007, pp:189-199 [Conf]

  27. Hardbound: architectural support for spatial safety of the C programming language. [Citation Graph (, )][DBLP]


  28. Reactive noninterference. [Citation Graph (, )][DBLP]


  29. Updatable Security Views. [Citation Graph (, )][DBLP]


  30. Evidence-Based Audit. [Citation Graph (, )][DBLP]


  31. AURA: a programming language for authorization and audit. [Citation Graph (, )][DBLP]


  32. CETS: compiler enforced temporal safety for C. [Citation Graph (, )][DBLP]


  33. SoftBound: highly compatible and complete spatial memory safety for c. [Citation Graph (, )][DBLP]


  34. Encoding information flow in Aura. [Citation Graph (, )][DBLP]


  35. Strong and Weak Policy Relations. [Citation Graph (, )][DBLP]


  36. Application-level concurrency: combining events and treads: invited talk. [Citation Graph (, )][DBLP]


  37. Lightweight linear types in system fdegree. [Citation Graph (, )][DBLP]


  38. It Is Time to Mechanize Programming Language Metatheory. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002