Search the dblp DataBase
Andrew C. Myers :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Mark Day , Barbara Liskov , Umesh Maheshwari , Andrew C. Myers References to Remote Mobile Objects in Thor. [Citation Graph (4, 0)][DBLP ] LOPLAS, 1993, v:2, n:1-4, pp:115-126 [Journal ] Barbara Liskov , Atul Adya , Miguel Castro , Mark Day , Sanjay Ghemawat , Robert Gruber , Umesh Maheshwari , Andrew C. Myers , Liuba Shrira Safe and Efficient Sharing of Persistent Objects in Thor. [Citation Graph (3, 25)][DBLP ] SIGMOD Conference, 1996, pp:318-329 [Conf ] Mark Day , Robert Gruber , Barbara Liskov , Andrew C. Myers Subtypes vs. Where Clauses: Constraining Parametric Polymorphism. [Citation Graph (1, 0)][DBLP ] OOPSLA, 1995, pp:156-168 [Conf ] Miguel Castro , Atul Adya , Barbara Liskov , Andrew C. Myers HAC: Hybrid Adaptive Caching for Distributed Storage Systems. [Citation Graph (1, 0)][DBLP ] SOSP, 1997, pp:102-115 [Conf ] Nathaniel Nystrom , Michael R. Clarkson , Andrew C. Myers Polyglot: An Extensible Compiler Framework for Java. [Citation Graph (0, 0)][DBLP ] CC, 2003, pp:138-152 [Conf ] Stephen Chong , Andrew C. Myers Security policies for downgrading. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:198-209 [Conf ] Stephen Chong , Andrew C. Myers Language-Based Information Erasure. [Citation Graph (0, 0)][DBLP ] CSFW, 2005, pp:241-254 [Conf ] Michael R. Clarkson , Andrew C. Myers , Fred B. Schneider Belief in Information Flow. [Citation Graph (0, 0)][DBLP ] CSFW, 2005, pp:31-45 [Conf ] Andrew C. Myers , Andrei Sabelfeld , Steve Zdancewic Enforcing Robust Declassification. [Citation Graph (0, 0)][DBLP ] CSFW, 2004, pp:172-186 [Conf ] Steve Zdancewic , Andrew C. Myers Robust Declassification. [Citation Graph (0, 0)][DBLP ] CSFW, 2001, pp:15- [Conf ] Steve Zdancewic , Andrew C. Myers Observational Determinism for Concurrent Program Security. [Citation Graph (0, 0)][DBLP ] CSFW, 2003, pp:29-0 [Conf ] Lantian Zheng , Andrew C. Myers End-to-End Availability Policies and Noninterference. [Citation Graph (0, 0)][DBLP ] CSFW, 2005, pp:272-286 [Conf ] Stephen Chong , Andrew C. Myers Decentralized Robustness. [Citation Graph (0, 0)][DBLP ] CSFW, 2006, pp:242-256 [Conf ] Andrew C. Myers Programming with Explicit Security Policies. [Citation Graph (0, 0)][DBLP ] ESOP, 2005, pp:1-4 [Conf ] Steve Zdancewic , Andrew C. Myers Secure Information Flow and CPS. [Citation Graph (0, 0)][DBLP ] ESOP, 2001, pp:46-61 [Conf ] Andrew C. Myers Resolving the Integrity/Performance Conflict. [Citation Graph (0, 0)][DBLP ] Workshop on Workstation Operating Systems, 1993, pp:156-159 [Conf ] Lantian Zheng , Andrew C. Myers Dynamic Security Labels and Noninterference (Extended Abstract). [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2004, pp:27-40 [Conf ] Andrei Sabelfeld , Andrew C. Myers A Model for Delimited Information Release. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:174-191 [Conf ] Andrew C. Myers Bidirectional Object Layout for Separate Compilation. [Citation Graph (0, 0)][DBLP ] OOPSLA, 1995, pp:124-139 [Conf ] Nathaniel Nystrom , Stephen Chong , Andrew C. Myers Scalable extensibility via nested inheritance. [Citation Graph (0, 0)][DBLP ] OOPSLA, 2004, pp:99-115 [Conf ] Nathaniel Nystrom , Xin Qi , Andrew C. Myers J&: nested intersection for scalable software composition. [Citation Graph (0, 0)][DBLP ] OOPSLA, 2006, pp:21-36 [Conf ] Jed Liu , Andrew C. Myers JMatch: Iterable Abstract Pattern Matching for Java. [Citation Graph (0, 0)][DBLP ] PADL, 2003, pp:110-127 [Conf ] Andrew C. Myers Making distributed systems secure with program analysis and transformation. [Citation Graph (0, 0)][DBLP ] PASTE, 2005, pp:47- [Conf ] Andrew C. Myers , Joseph A. Bank , Barbara Liskov Parameterized Types for Java. [Citation Graph (0, 0)][DBLP ] POPL, 1997, pp:132-145 [Conf ] Jed Liu , Aaron Kimball , Andrew C. Myers Interruptible iterators. [Citation Graph (0, 0)][DBLP ] POPL, 2006, pp:283-294 [Conf ] Andrew C. Myers JFlow: Practical Mostly-Static Information Flow Control. [Citation Graph (0, 0)][DBLP ] POPL, 1999, pp:228-241 [Conf ] Andrew C. Myers Security-Typed Languages and Distributed Computation. [Citation Graph (0, 0)][DBLP ] SAS, 2001, pp:437-438 [Conf ] Chavdar Botev , Hubert Chao , Theodore Chao , Yim Cheng , Raymond Doyle , Sergey Grankin , Jon Guarino , Saikat Guha , Pei-Chen Lee , Dan Perry , Christopher Re , Ilya Rifkin , Tingyan Yuan , Dora Abdullah , Kathy Carpenter , David Gries , Dexter Kozen , Andrew C. Myers , David I. Schwartz , Jayavel Shanmugasundaram Supporting workflow in a course management system. [Citation Graph (0, 0)][DBLP ] SIGCSE, 2005, pp:262-266 [Conf ] Andrew C. Myers , Barbara Liskov A Decentralized Model for Information Flow Control. [Citation Graph (0, 0)][DBLP ] SOSP, 1997, pp:129-142 [Conf ] Steve Zdancewic , Lantian Zheng , Nathaniel Nystrom , Andrew C. Myers Untrusted Hosts and Confidentiality: Secure Program Partitioning. [Citation Graph (0, 0)][DBLP ] SOSP, 2001, pp:1-14 [Conf ] Lantian Zheng , Stephen Chong , Andrew C. Myers , Steve Zdancewic Using Replication and Partitioning to Build Secure Distributed Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2003, pp:236-250 [Conf ] Andrew C. Myers , Andrei Sabelfeld , Steve Zdancewic Enforcing Robust Declassification and Qualified Robustness. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2006, v:14, n:2, pp:157-196 [Journal ] Steve Zdancewic , Andrew C. Myers Secure Information Flow via Linear Continuations. [Citation Graph (0, 0)][DBLP ] Higher-Order and Symbolic Computation, 2002, v:15, n:2-3, pp:209-234 [Journal ] Steve Zdancewic , Lantian Zheng , Nathaniel Nystrom , Andrew C. Myers Secure program partitioning. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Syst., 2002, v:20, n:3, pp:283-328 [Journal ] Andrew C. Myers , Barbara Liskov Protecting privacy using the decentralized label model. [Citation Graph (0, 0)][DBLP ] ACM Trans. Softw. Eng. Methodol., 2000, v:9, n:4, pp:410-442 [Journal ] Alan Shieh , Andrew C. Myers , Emin Gün Sirer Trickles: A Stateless Network Stack for Improved Scalability, Resilience, and Flexibility. [Citation Graph (0, 0)][DBLP ] NSDI, 2005, pp:- [Conf ] Stephen Chong , Jed Liu , Andrew C. Myers , Xin Qi , K. Vikram , Lantian Zheng , Xin Zheng Secure web application via automatic partitioning. [Citation Graph (0, 0)][DBLP ] SOSP, 2007, pp:31-44 [Conf ] Lantian Zheng , Andrew C. Myers Dynamic security labels and static information flow control. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:67-84 [Journal ] End-to-End Enforcement of Erasure and Declassification. [Citation Graph (, )][DBLP ] Civitas: A Secure Remote Voting System. [Citation Graph (, )][DBLP ] 07091 Executive Summary - Mobility, Ubiquity and Security. [Citation Graph (, )][DBLP ] 07091 Abstracts Collection - Mobility, Ubiquity and Security. [Citation Graph (, )][DBLP ] Securing nonintrusive web encryption through information flow. [Citation Graph (, )][DBLP ] Sharing classes between families. [Citation Graph (, )][DBLP ] Masked types for sound object initialization. [Citation Graph (, )][DBLP ] Fabric: a platform for secure distributed computation and storage. [Citation Graph (, )][DBLP ] Civitas: Toward a Secure Voting System. [Citation Graph (, )][DBLP ] Complete, Safe Information Flow with Decentralized Labels. [Citation Graph (, )][DBLP ] Building secure web applications with automatic partitioning. [Citation Graph (, )][DBLP ] Search in 0.049secs, Finished in 0.050secs