The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Philip W. L. Fong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Philip W. L. Fong
    Discretionary Capability Confinement. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:127-144 [Conf]
  2. Philip W. L. Fong
    A Quantitative Study of Hypothesis Selection. [Citation Graph (0, 0)][DBLP]
    ICML, 1995, pp:226-234 [Conf]
  3. Premkumar T. Devanbu, Philip W. L. Fong, Stuart G. Stubblebine
    Techniques for Trusted Software Engineering. [Citation Graph (0, 0)][DBLP]
    ICSE, 1998, pp:126-135 [Conf]
  4. Philip W. L. Fong, Robert D. Cameron
    Proof Linking: Distributed Verification of Java Classfiles in the Presence of Multiple Classloaders. [Citation Graph (0, 0)][DBLP]
    Java™ Virtual Machine Research and Technology Symposium, 2001, pp:53-66 [Conf]
  5. Philip W. L. Fong
    Pluggable verification modules: an extensible protection mechanism for the JVM. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 2004, pp:404-418 [Conf]
  6. Philip W. L. Fong
    Link-Time Enforcement of Confined Types for JVM Bytecode. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  7. Philip W. L. Fong, Robert D. Cameron
    Proof Linking: An Architecture for Modular Verification of Dynamically-Linked Mobile Code. [Citation Graph (0, 0)][DBLP]
    SIGSOFT FSE, 1998, pp:222-230 [Conf]
  8. Philip W. L. Fong
    Access Control By Tracking Shallow Execution History. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:43-55 [Conf]
  9. Philip W. L. Fong, Robert D. Cameron
    Proof linking: modular verification of mobile programs in the presence of lazy, dynamic linking. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 2000, v:9, n:4, pp:379-409 [Journal]
  10. Philip W. L. Fong, Simon A. Orr
    A Module System for Isolating Untrusted Software Extensions. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:203-212 [Conf]
  11. Philip W. L. Fong
    Reasoning about safety properties in a JVM-like environment. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2007, v:67, n:2-3, pp:278-300 [Journal]

  12. Efficient IRM enforcement of history-based access control policies. [Citation Graph (, )][DBLP]


  13. A Privacy Preservation Model for Facebook-Style Social Network Systems. [Citation Graph (, )][DBLP]


  14. Visualizing Privacy Implications of Access Control Policies in Social Network Systems. [Citation Graph (, )][DBLP]


  15. Isolating untrusted software extensions by custom scoping rules. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002