The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Anindya Banerjee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Anindya Banerjee, David A. Naumann
    History-Based Access Control and Secure Information Flow. [Citation Graph (0, 0)][DBLP]
    CASSIS, 2004, pp:27-48 [Conf]
  2. Anindya Banerjee, David A. Naumann
    Secure Information Flow and Pointer Confinement in a Java-like Language. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:253-0 [Conf]
  3. Anindya Banerjee, David A. Naumann
    Using Access Control for Secure Information Flow in a Java-like Language. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:155-169 [Conf]
  4. Anindya Banerjee, Heiko Mantel, David A. Naumann, Andrei Sabelfeld
    03411 Final Report - Language Based Security. [Citation Graph (0, 0)][DBLP]
    Language Based Security, 2003, pp:- [Conf]
  5. Anindya Banerjee, Heiko Mantel, David A. Naumann, Andrei Sabelfeld
    03411 Abstracts Collection - Language Based Security. [Citation Graph (0, 0)][DBLP]
    Language Based Security, 2003, pp:- [Conf]
  6. Anindya Banerjee, David A. Naumann
    State Based Ownership, Reentrance, and Encapsulation. [Citation Graph (0, 0)][DBLP]
    ECOOP, 2005, pp:387-411 [Conf]
  7. Venkatesh Prasad Ranganath, Torben Amtoft, Anindya Banerjee, Matthew B. Dwyer, John Hatcliff
    A New Foundation for Control-Dependence and Slicing for Modern Program Structures. [Citation Graph (0, 0)][DBLP]
    ESOP, 2005, pp:77-93 [Conf]
  8. Anindya Banerjee
    A Modular, Polyvariant, and Type-Based Closure Analysis. [Citation Graph (0, 0)][DBLP]
    ICFP, 1997, pp:1-10 [Conf]
  9. Anindya Banerjee, Nevin Heintze, Jon G. Riecke
    Region Analysis and the Polymorphic Lambda Calculus. [Citation Graph (0, 0)][DBLP]
    LICS, 1999, pp:88-97 [Conf]
  10. Anindya Banerjee, David A. Schmidt
    A Categorical Interpretation of Landin's Correspondence Principle. [Citation Graph (0, 0)][DBLP]
    MFPS, 1993, pp:587-602 [Conf]
  11. Martín Abadi, Anindya Banerjee, Nevin Heintze, Jon G. Riecke
    A Core Calculus of Dependency. [Citation Graph (0, 0)][DBLP]
    POPL, 1999, pp:147-160 [Conf]
  12. Torben Amtoft, Sruthi Bandhakavi, Anindya Banerjee
    A logic for information flow in object-oriented programs. [Citation Graph (0, 0)][DBLP]
    POPL, 2006, pp:91-102 [Conf]
  13. Anindya Banerjee, David A. Naumann
    Representation independence, confinement and access control [extended abstract]. [Citation Graph (0, 0)][DBLP]
    POPL, 2002, pp:166-177 [Conf]
  14. Torben Amtoft, Anindya Banerjee
    Information Flow Analysis in Logical Form. [Citation Graph (0, 0)][DBLP]
    SAS, 2004, pp:100-115 [Conf]
  15. Anindya Banerjee, David A. Schmidt
    Stackability in the Simply-Typed Call-by-Value Lambda Calculus. [Citation Graph (0, 0)][DBLP]
    SAS, 1994, pp:131-146 [Conf]
  16. Qi Sun, Anindya Banerjee, David A. Naumann
    Modular and Constraint-Based Information Flow Inference for an Object-Oriented Language. [Citation Graph (0, 0)][DBLP]
    SAS, 2004, pp:84-99 [Conf]
  17. Marco Pistoia, Anindya Banerjee, David A. Naumann
    Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:149-163 [Conf]
  18. Anindya Banerjee, Nevin Heintze, Jon G. Riecke
    Design and Correctness of Program Transformations Based on Control-Flow Analysis. [Citation Graph (0, 0)][DBLP]
    TACS, 2001, pp:420-447 [Conf]
  19. Anindya Banerjee, David A. Naumann
    Ownership Confinement Ensures Representation Independence for Object-Oriented Programs [Citation Graph (0, 0)][DBLP]
    CoRR, 2002, v:0, n:, pp:- [Journal]
  20. Anindya Banerjee, Roberto Giacobazzi, Isabella Mastroeni
    What You Lose is What You Leak: Information Leakage in Declassification Policies. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:173, n:, pp:47-66 [Journal]
  21. Anindya Banerjee, David A. Naumann
    Ownership confinement ensures representation independence for object-oriented programs. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2005, v:52, n:6, pp:894-960 [Journal]
  22. Anindya Banerjee, David A. Naumann
    Stack-based access control and secure information flow. [Citation Graph (0, 0)][DBLP]
    J. Funct. Program., 2005, v:15, n:2, pp:131-177 [Journal]
  23. Anindya Banerjee, Thomas P. Jensen
    Modular Control-Flow Analysis with Rank 2 Intersection Types. [Citation Graph (0, 0)][DBLP]
    Mathematical Structures in Computer Science, 2003, v:13, n:1, pp:87-124 [Journal]
  24. Anindya Banerjee, David A. Schmidt
    Stackability in the Simply-Typed Call-by-Value lambda Calculus. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1998, v:31, n:1, pp:47-73 [Journal]
  25. Torben Amtoft, Anindya Banerjee
    A logic for information flow analysis with an application to forward slicing of simple imperative programs. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2007, v:64, n:1, pp:3-28 [Journal]
  26. Venkatesh Prasad Ranganath, Torben Amtoft, Anindya Banerjee, John Hatcliff, Matthew B. Dwyer
    A new foundation for control dependence and slicing for modern program structures. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2007, v:29, n:5, pp:- [Journal]

  27. Automata-Based Confidentiality Monitoring. [Citation Graph (, )][DBLP]


  28. Verification condition generation for conditional information flow. [Citation Graph (, )][DBLP]


  29. Regional Logic for Local Reasoning about Global Invariants. [Citation Graph (, )][DBLP]


  30. Formal Techniques for Java-Like Programs. [Citation Graph (, )][DBLP]


  31. Dynamic Boundaries: Information Hiding by Second Order Framing with First Order Assertions. [Citation Graph (, )][DBLP]


  32. Semantics and Enforcement of Expressive Information Flow Policies. [Citation Graph (, )][DBLP]


  33. Towards a logical account of declassification. [Citation Graph (, )][DBLP]


  34. Merlin: specification inference for explicit information flow problems. [Citation Graph (, )][DBLP]


  35. A language for information flow: dynamic tracking in multiple interdependent dimensions. [Citation Graph (, )][DBLP]


  36. Expressive Declassification Policies and Modular Static Enforcement. [Citation Graph (, )][DBLP]


  37. Boogie Meets Regions: A Verification Experience Report. [Citation Graph (, )][DBLP]


  38. Local Reasoning and Dynamic Framing for the Composite Pattern and Its Clients. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.304secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002