The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Geoffrey Smith: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhenyue Deng, Geoffrey Smith
    Type inference and informative error reporting for secure information flow. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:543-548 [Conf]
  2. Geoffrey Smith
    Inductive bases and their application to searches for minimal unary NFAs. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:470-475 [Conf]
  3. Geoffrey Smith
    Secure information flow with random assignment and encryption. [Citation Graph (0, 0)][DBLP]
    FMSE, 2006, pp:33-44 [Conf]
  4. Zhenyue Deng, Geoffrey Smith
    Lenient Array Operations for Practical Secure Information Flow. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:115-0 [Conf]
  5. Geoffrey Smith
    A New Type System for Secure Information Flow. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:115-125 [Conf]
  6. Geoffrey Smith
    Probabilistic Noninterference through Weak Probabilistic Bisimulation. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:3-13 [Conf]
  7. Dennis M. Volpano, Geoffrey Smith
    Eliminating Covert Flows with Minimum Typings. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:156-169 [Conf]
  8. Dennis M. Volpano, Geoffrey Smith
    Probabilistic Noninterference in a Concurrent Language. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:34-43 [Conf]
  9. Geoffrey Smith, Dennis M. Volpano
    Towards an ML-Style Polymorphic Type System for C. [Citation Graph (0, 0)][DBLP]
    ESOP, 1996, pp:341-355 [Conf]
  10. Dennis M. Volpano, Geoffrey Smith
    On the Complexity of ML Typability with Overloading. [Citation Graph (0, 0)][DBLP]
    FPCA, 1991, pp:15-28 [Conf]
  11. Dennis M. Volpano, Geoffrey Smith
    Language Issues in Mobile Program Security. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:25-43 [Conf]
  12. Geoffrey Smith, Dennis M. Volpano
    Secure Information Flow in a Multi-Threaded Imperative Language. [Citation Graph (0, 0)][DBLP]
    POPL, 1998, pp:355-364 [Conf]
  13. Dennis M. Volpano, Geoffrey Smith
    Verifying Secrets and Relative Secrecy. [Citation Graph (0, 0)][DBLP]
    POPL, 2000, pp:268-276 [Conf]
  14. Nathan N. Vuong, Geoffrey Smith, Yi Deng
    Managing security policies in a distributed environment using eXtensible markup language (XML). [Citation Graph (0, 0)][DBLP]
    SAC, 2001, pp:405-411 [Conf]
  15. Geoffrey Smith
    Polymorphic Type Inference with Overloading and Subtyping. [Citation Graph (0, 0)][DBLP]
    TAPSOFT, 1993, pp:671-685 [Conf]
  16. Dennis M. Volpano, Geoffrey Smith
    A Type-Based Approach to Program Security. [Citation Graph (0, 0)][DBLP]
    TAPSOFT, 1997, pp:607-621 [Conf]
  17. Franck Chevalier, David Harle, Geoffrey Smith
    Resource Discovery in Trilogy [Citation Graph (0, 0)][DBLP]
    CoRR, 1999, v:0, n:, pp:- [Journal]
  18. Dennis M. Volpano, Geoffrey Smith
    On the Systematic Design of Web Languages. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1996, v:28, n:2, pp:315-317 [Journal]
  19. Geoffrey Smith, Dennis M. Volpano
    Confinement Properties for Multi-Threaded Programs. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 1999, v:20, n:, pp:- [Journal]
  20. Dennis M. Volpano, Geoffrey Smith
    A Type Soundness Proof for Variables in LCF ML. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1995, v:56, n:3, pp:141-146 [Journal]
  21. Dennis M. Volpano, Cynthia E. Irvine, Geoffrey Smith
    A Sound Type System for Secure Flow Analysis. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1996, v:4, n:2/3, pp:167-188 [Journal]
  22. Dennis M. Volpano, Geoffrey Smith
    Probabilistic Noninterference in a Concurrent Language. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1999, v:7, n:1, pp:- [Journal]
  23. Geoffrey Smith
    Improved typings for probabilistic noninterference in a multi-threaded language. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2006, v:14, n:6, pp:591-623 [Journal]
  24. Geoffrey Smith
    Principal Type Schemes for Functional Programs with Overloading and Subtyping. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1994, v:23, n:2-3, pp:197-226 [Journal]
  25. Geoffrey Smith, Dennis M. Volpano
    A Sound Polymorphic Type System for a Dialect of C. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1998, v:32, n:1-3, pp:49-72 [Journal]
  26. Geoffrey Smith, Dennis M. Volpano
    Polymorphic typing of Variables and References. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1996, v:18, n:3, pp:254-267 [Journal]

  27. Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks. [Citation Graph (, )][DBLP]


  28. On the Foundations of Quantitative Information Flow. [Citation Graph (, )][DBLP]


  29. Anatomy of a Real-Time Intrusion Prevention System. [Citation Graph (, )][DBLP]


  30. Secure Information Flow for Distributed Systems. [Citation Graph (, )][DBLP]


  31. Fast probabilistic simulation, nontermination, and secure information flow. [Citation Graph (, )][DBLP]


  32. Computing the Leakage of Information-Hiding Systems. [Citation Graph (, )][DBLP]


  33. Adversaries and Information Leaks (Tutorial). [Citation Graph (, )][DBLP]


Search in 0.868secs, Finished in 0.870secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002