The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Christian Skalka: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Christian Skalka, Scott F. Smith
    History Effects and Verification. [Citation Graph (0, 0)][DBLP]
    APLAS, 2004, pp:107-128 [Conf]
  2. Peter Chapin, Christian Skalka, Xiaoyang Sean Wang
    Risk assessment in distributed authorization. [Citation Graph (0, 0)][DBLP]
    FMSE, 2005, pp:33-42 [Conf]
  3. François Pottier, Christian Skalka, Scott F. Smith
    A Systematic Approach to Static Access Control. [Citation Graph (0, 0)][DBLP]
    ESOP, 2001, pp:30-45 [Conf]
  4. Christian Skalka, Scott F. Smith
    Static enforcement of security with types. [Citation Graph (0, 0)][DBLP]
    ICFP, 2000, pp:34-45 [Conf]
  5. Christian Skalka
    Trace effects and object orientation. [Citation Graph (0, 0)][DBLP]
    PPDP, 2005, pp:139-150 [Conf]
  6. Christian Skalka, François Pottier
    Syntactic Type Soundness for HM(X). [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2002, v:75, n:, pp:- [Journal]
  7. Christian Skalka, Scott F. Smith
    Set Types and Applications. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2002, v:75, n:, pp:- [Journal]
  8. Christian Skalka, Scott F. Smith, David Van Horn
    A Type and Effect System for Flexible Abstract Interpretation of Java: (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:131, n:, pp:111-124 [Journal]
  9. Christian Skalka
    Programming Languages and Systems Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:80-83 [Journal]
  10. Christian Skalka, Scott F. Smith
    Static use-based object confinement. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:87-104 [Journal]
  11. François Pottier, Christian Skalka, Scott F. Smith
    A systematic approach to static access control. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2005, v:27, n:2, pp:344-382 [Journal]
  12. Christian Skalka
    Type safe dynamic linking for JVM access control. [Citation Graph (0, 0)][DBLP]
    PPDP, 2007, pp:51-62 [Conf]

  13. The Nuggetizer: Abstracting Away Higher-Orderness for Program Verification. [Citation Graph (, )][DBLP]


  14. Self-identifying sensor data. [Citation Graph (, )][DBLP]


  15. Specifying distributed trust management in LolliMon. [Citation Graph (, )][DBLP]


  16. Trust but verify: authorization for web services. [Citation Graph (, )][DBLP]


  17. Authorization in trust management: Features and foundations. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002