Search the dblp DataBase
Geoffrey Smith :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Zhenyue Deng , Geoffrey Smith Type inference and informative error reporting for secure information flow. [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference, 2006, pp:543-548 [Conf ] Geoffrey Smith Inductive bases and their application to searches for minimal unary NFAs. [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference, 2006, pp:470-475 [Conf ] Geoffrey Smith Secure information flow with random assignment and encryption. [Citation Graph (0, 0)][DBLP ] FMSE, 2006, pp:33-44 [Conf ] Zhenyue Deng , Geoffrey Smith Lenient Array Operations for Practical Secure Information Flow. [Citation Graph (0, 0)][DBLP ] CSFW, 2004, pp:115-0 [Conf ] Geoffrey Smith A New Type System for Secure Information Flow. [Citation Graph (0, 0)][DBLP ] CSFW, 2001, pp:115-125 [Conf ] Geoffrey Smith Probabilistic Noninterference through Weak Probabilistic Bisimulation. [Citation Graph (0, 0)][DBLP ] CSFW, 2003, pp:3-13 [Conf ] Dennis M. Volpano , Geoffrey Smith Eliminating Covert Flows with Minimum Typings. [Citation Graph (0, 0)][DBLP ] CSFW, 1997, pp:156-169 [Conf ] Dennis M. Volpano , Geoffrey Smith Probabilistic Noninterference in a Concurrent Language. [Citation Graph (0, 0)][DBLP ] CSFW, 1998, pp:34-43 [Conf ] Geoffrey Smith , Dennis M. Volpano Towards an ML-Style Polymorphic Type System for C. [Citation Graph (0, 0)][DBLP ] ESOP, 1996, pp:341-355 [Conf ] Dennis M. Volpano , Geoffrey Smith On the Complexity of ML Typability with Overloading. [Citation Graph (0, 0)][DBLP ] FPCA, 1991, pp:15-28 [Conf ] Dennis M. Volpano , Geoffrey Smith Language Issues in Mobile Program Security. [Citation Graph (0, 0)][DBLP ] Mobile Agents and Security, 1998, pp:25-43 [Conf ] Geoffrey Smith , Dennis M. Volpano Secure Information Flow in a Multi-Threaded Imperative Language. [Citation Graph (0, 0)][DBLP ] POPL, 1998, pp:355-364 [Conf ] Dennis M. Volpano , Geoffrey Smith Verifying Secrets and Relative Secrecy. [Citation Graph (0, 0)][DBLP ] POPL, 2000, pp:268-276 [Conf ] Nathan N. Vuong , Geoffrey Smith , Yi Deng Managing security policies in a distributed environment using eXtensible markup language (XML). [Citation Graph (0, 0)][DBLP ] SAC, 2001, pp:405-411 [Conf ] Geoffrey Smith Polymorphic Type Inference with Overloading and Subtyping. [Citation Graph (0, 0)][DBLP ] TAPSOFT, 1993, pp:671-685 [Conf ] Dennis M. Volpano , Geoffrey Smith A Type-Based Approach to Program Security. [Citation Graph (0, 0)][DBLP ] TAPSOFT, 1997, pp:607-621 [Conf ] Franck Chevalier , David Harle , Geoffrey Smith Resource Discovery in Trilogy [Citation Graph (0, 0)][DBLP ] CoRR, 1999, v:0, n:, pp:- [Journal ] Dennis M. Volpano , Geoffrey Smith On the Systematic Design of Web Languages. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1996, v:28, n:2, pp:315-317 [Journal ] Geoffrey Smith , Dennis M. Volpano Confinement Properties for Multi-Threaded Programs. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 1999, v:20, n:, pp:- [Journal ] Dennis M. Volpano , Geoffrey Smith A Type Soundness Proof for Variables in LCF ML. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1995, v:56, n:3, pp:141-146 [Journal ] Dennis M. Volpano , Cynthia E. Irvine , Geoffrey Smith A Sound Type System for Secure Flow Analysis. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1996, v:4, n:2/3, pp:167-188 [Journal ] Dennis M. Volpano , Geoffrey Smith Probabilistic Noninterference in a Concurrent Language. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1999, v:7, n:1, pp:- [Journal ] Geoffrey Smith Improved typings for probabilistic noninterference in a multi-threaded language. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2006, v:14, n:6, pp:591-623 [Journal ] Geoffrey Smith Principal Type Schemes for Functional Programs with Overloading and Subtyping. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 1994, v:23, n:2-3, pp:197-226 [Journal ] Geoffrey Smith , Dennis M. Volpano A Sound Polymorphic Type System for a Dialect of C. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 1998, v:32, n:1-3, pp:49-72 [Journal ] Geoffrey Smith , Dennis M. Volpano Polymorphic typing of Variables and References. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1996, v:18, n:3, pp:254-267 [Journal ] Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks. [Citation Graph (, )][DBLP ] On the Foundations of Quantitative Information Flow. [Citation Graph (, )][DBLP ] Anatomy of a Real-Time Intrusion Prevention System. [Citation Graph (, )][DBLP ] Secure Information Flow for Distributed Systems. [Citation Graph (, )][DBLP ] Fast probabilistic simulation, nontermination, and secure information flow. [Citation Graph (, )][DBLP ] Computing the Leakage of Information-Hiding Systems. [Citation Graph (, )][DBLP ] Adversaries and Information Leaks (Tutorial). [Citation Graph (, )][DBLP ] Search in 0.416secs, Finished in 0.419secs