|
Search the dblp DataBase
Steve Zdancewic:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
Enforcing Robust Declassification. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:172-186 [Conf]
- Peng Li, Steve Zdancewic
Practical Information-flow Control in Web-Based Information Systems. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:2-15 [Conf]
- Steve Zdancewic, Andrew C. Myers
Robust Declassification. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:15- [Conf]
- Steve Zdancewic, Andrew C. Myers
Observational Determinism for Concurrent Program Security. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:29-0 [Conf]
- Nikhil Swamy, Michael Hicks, Stephen Tse, Steve Zdancewic
Managing Policy Updates in Security-Typed Languages. [Citation Graph (0, 0)][DBLP] CSFW, 2006, pp:202-216 [Conf]
- Peng Li, Steve Zdancewic
Encoding Information Flow in Haskell. [Citation Graph (0, 0)][DBLP] CSFW, 2006, pp:16- [Conf]
- Stephen Tse, Steve Zdancewic
A Design for a Security-Typed Language with Certificate-Based Declassification. [Citation Graph (0, 0)][DBLP] ESOP, 2005, pp:279-294 [Conf]
- Steve Zdancewic, Andrew C. Myers
Secure Information Flow and CPS. [Citation Graph (0, 0)][DBLP] ESOP, 2001, pp:46-61 [Conf]
- Rajeev Alur, Pavol Cerný, Steve Zdancewic
Preserving Secrecy Under Refinement. [Citation Graph (0, 0)][DBLP] ICALP (2), 2006, pp:107-118 [Conf]
- Stephen Tse, Steve Zdancewic
Translating dependency into parametricity. [Citation Graph (0, 0)][DBLP] ICFP, 2004, pp:115-125 [Conf]
- David Walker, Steve Zdancewic, Jay Ligatti
A theory of aspects. [Citation Graph (0, 0)][DBLP] ICFP, 2003, pp:127-139 [Conf]
- Steve Zdancewic, Dan Grossman, J. Gregory Morrisett
Principals in Programming Languages: A Syntactic Proof Technique. [Citation Graph (0, 0)][DBLP] ICFP, 1999, pp:197-207 [Conf]
- Peng Li, Steve Zdancewic
Advanced control flow in Java card programming. [Citation Graph (0, 0)][DBLP] LCTES, 2004, pp:165-174 [Conf]
- Peng Li, Steve Zdancewic
Downgrading policies and relaxed noninterference. [Citation Graph (0, 0)][DBLP] POPL, 2005, pp:158-170 [Conf]
- Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers
Untrusted Hosts and Confidentiality: Secure Program Partitioning. [Citation Graph (0, 0)][DBLP] SOSP, 2001, pp:1-14 [Conf]
- Stephen Tse, Steve Zdancewic
Run-time Principals in Information-flow Type Systems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2004, pp:179-193 [Conf]
- Lantian Zheng, Stephen Chong, Andrew C. Myers, Steve Zdancewic
Using Replication and Partitioning to Build Secure Distributed Systems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:236-250 [Conf]
- Jeffrey A. Vaughan, Steve Zdancewic
A Cryptographic Decentralized Label Model. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2007, pp:192-206 [Conf]
- Brian E. Aydemir, Aaron Bohannon, Matthew Fairbairn, J. Nathan Foster, Benjamin C. Pierce, Peter Sewell, Dimitrios Vytiniotis, Geoffrey Washburn, Stephanie Weirich, Steve Zdancewic
Mechanized Metatheory for the Masses: The PoplMark Challenge. [Citation Graph (0, 0)][DBLP] TPHOLs, 2005, pp:50-65 [Conf]
- Usa Sammapun, Raman Sharykin, Margaret DeLap, Myong Kim, Steve Zdancewic
Formalizing Java-MaC. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2003, v:89, n:2, pp:- [Journal]
- Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
Enforcing Robust Declassification and Qualified Robustness. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2006, v:14, n:2, pp:157-196 [Journal]
- Steve Zdancewic, Andrew C. Myers
Secure Information Flow via Linear Continuations. [Citation Graph (0, 0)][DBLP] Higher-Order and Symbolic Computation, 2002, v:15, n:2-3, pp:209-234 [Journal]
- Jay Ligatti, David Walker, Steve Zdancewic
A type-theoretic interpretation of pointcuts and advice. [Citation Graph (0, 0)][DBLP] Sci. Comput. Program., 2006, v:63, n:3, pp:240-266 [Journal]
- Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers
Secure program partitioning. [Citation Graph (0, 0)][DBLP] ACM Trans. Comput. Syst., 2002, v:20, n:3, pp:283-328 [Journal]
- Dan Grossman, J. Gregory Morrisett, Steve Zdancewic
Syntactic type abstraction. [Citation Graph (0, 0)][DBLP] ACM Trans. Program. Lang. Syst., 2000, v:22, n:6, pp:1037-1080 [Journal]
- Peng Li, Steve Zdancewic
Combining events and threads for scalable network services implementation and evaluation of monadic, application-level concurrency primitives. [Citation Graph (0, 0)][DBLP] PLDI, 2007, pp:189-199 [Conf]
Hardbound: architectural support for spatial safety of the C programming language. [Citation Graph (, )][DBLP]
Reactive noninterference. [Citation Graph (, )][DBLP]
Updatable Security Views. [Citation Graph (, )][DBLP]
Evidence-Based Audit. [Citation Graph (, )][DBLP]
AURA: a programming language for authorization and audit. [Citation Graph (, )][DBLP]
CETS: compiler enforced temporal safety for C. [Citation Graph (, )][DBLP]
SoftBound: highly compatible and complete spatial memory safety for c. [Citation Graph (, )][DBLP]
Encoding information flow in Aura. [Citation Graph (, )][DBLP]
Strong and Weak Policy Relations. [Citation Graph (, )][DBLP]
Application-level concurrency: combining events and treads: invited talk. [Citation Graph (, )][DBLP]
Lightweight linear types in system fdegree. [Citation Graph (, )][DBLP]
It Is Time to Mechanize Programming Language Metatheory. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.301secs
|