The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Andrew C. Myers: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mark Day, Barbara Liskov, Umesh Maheshwari, Andrew C. Myers
    References to Remote Mobile Objects in Thor. [Citation Graph (4, 0)][DBLP]
    LOPLAS, 1993, v:2, n:1-4, pp:115-126 [Journal]
  2. Barbara Liskov, Atul Adya, Miguel Castro, Mark Day, Sanjay Ghemawat, Robert Gruber, Umesh Maheshwari, Andrew C. Myers, Liuba Shrira
    Safe and Efficient Sharing of Persistent Objects in Thor. [Citation Graph (3, 25)][DBLP]
    SIGMOD Conference, 1996, pp:318-329 [Conf]
  3. Mark Day, Robert Gruber, Barbara Liskov, Andrew C. Myers
    Subtypes vs. Where Clauses: Constraining Parametric Polymorphism. [Citation Graph (1, 0)][DBLP]
    OOPSLA, 1995, pp:156-168 [Conf]
  4. Miguel Castro, Atul Adya, Barbara Liskov, Andrew C. Myers
    HAC: Hybrid Adaptive Caching for Distributed Storage Systems. [Citation Graph (1, 0)][DBLP]
    SOSP, 1997, pp:102-115 [Conf]
  5. Nathaniel Nystrom, Michael R. Clarkson, Andrew C. Myers
    Polyglot: An Extensible Compiler Framework for Java. [Citation Graph (0, 0)][DBLP]
    CC, 2003, pp:138-152 [Conf]
  6. Stephen Chong, Andrew C. Myers
    Security policies for downgrading. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:198-209 [Conf]
  7. Stephen Chong, Andrew C. Myers
    Language-Based Information Erasure. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:241-254 [Conf]
  8. Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider
    Belief in Information Flow. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:31-45 [Conf]
  9. Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
    Enforcing Robust Declassification. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:172-186 [Conf]
  10. Steve Zdancewic, Andrew C. Myers
    Robust Declassification. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:15- [Conf]
  11. Steve Zdancewic, Andrew C. Myers
    Observational Determinism for Concurrent Program Security. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:29-0 [Conf]
  12. Lantian Zheng, Andrew C. Myers
    End-to-End Availability Policies and Noninterference. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:272-286 [Conf]
  13. Stephen Chong, Andrew C. Myers
    Decentralized Robustness. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:242-256 [Conf]
  14. Andrew C. Myers
    Programming with Explicit Security Policies. [Citation Graph (0, 0)][DBLP]
    ESOP, 2005, pp:1-4 [Conf]
  15. Steve Zdancewic, Andrew C. Myers
    Secure Information Flow and CPS. [Citation Graph (0, 0)][DBLP]
    ESOP, 2001, pp:46-61 [Conf]
  16. Andrew C. Myers
    Resolving the Integrity/Performance Conflict. [Citation Graph (0, 0)][DBLP]
    Workshop on Workstation Operating Systems, 1993, pp:156-159 [Conf]
  17. Lantian Zheng, Andrew C. Myers
    Dynamic Security Labels and Noninterference (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:27-40 [Conf]
  18. Andrei Sabelfeld, Andrew C. Myers
    A Model for Delimited Information Release. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:174-191 [Conf]
  19. Andrew C. Myers
    Bidirectional Object Layout for Separate Compilation. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 1995, pp:124-139 [Conf]
  20. Nathaniel Nystrom, Stephen Chong, Andrew C. Myers
    Scalable extensibility via nested inheritance. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 2004, pp:99-115 [Conf]
  21. Nathaniel Nystrom, Xin Qi, Andrew C. Myers
    J&: nested intersection for scalable software composition. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 2006, pp:21-36 [Conf]
  22. Jed Liu, Andrew C. Myers
    JMatch: Iterable Abstract Pattern Matching for Java. [Citation Graph (0, 0)][DBLP]
    PADL, 2003, pp:110-127 [Conf]
  23. Andrew C. Myers
    Making distributed systems secure with program analysis and transformation. [Citation Graph (0, 0)][DBLP]
    PASTE, 2005, pp:47- [Conf]
  24. Andrew C. Myers, Joseph A. Bank, Barbara Liskov
    Parameterized Types for Java. [Citation Graph (0, 0)][DBLP]
    POPL, 1997, pp:132-145 [Conf]
  25. Jed Liu, Aaron Kimball, Andrew C. Myers
    Interruptible iterators. [Citation Graph (0, 0)][DBLP]
    POPL, 2006, pp:283-294 [Conf]
  26. Andrew C. Myers
    JFlow: Practical Mostly-Static Information Flow Control. [Citation Graph (0, 0)][DBLP]
    POPL, 1999, pp:228-241 [Conf]
  27. Andrew C. Myers
    Security-Typed Languages and Distributed Computation. [Citation Graph (0, 0)][DBLP]
    SAS, 2001, pp:437-438 [Conf]
  28. Chavdar Botev, Hubert Chao, Theodore Chao, Yim Cheng, Raymond Doyle, Sergey Grankin, Jon Guarino, Saikat Guha, Pei-Chen Lee, Dan Perry, Christopher Re, Ilya Rifkin, Tingyan Yuan, Dora Abdullah, Kathy Carpenter, David Gries, Dexter Kozen, Andrew C. Myers, David I. Schwartz, Jayavel Shanmugasundaram
    Supporting workflow in a course management system. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2005, pp:262-266 [Conf]
  29. Andrew C. Myers, Barbara Liskov
    A Decentralized Model for Information Flow Control. [Citation Graph (0, 0)][DBLP]
    SOSP, 1997, pp:129-142 [Conf]
  30. Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers
    Untrusted Hosts and Confidentiality: Secure Program Partitioning. [Citation Graph (0, 0)][DBLP]
    SOSP, 2001, pp:1-14 [Conf]
  31. Lantian Zheng, Stephen Chong, Andrew C. Myers, Steve Zdancewic
    Using Replication and Partitioning to Build Secure Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:236-250 [Conf]
  32. Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
    Enforcing Robust Declassification and Qualified Robustness. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2006, v:14, n:2, pp:157-196 [Journal]
  33. Steve Zdancewic, Andrew C. Myers
    Secure Information Flow via Linear Continuations. [Citation Graph (0, 0)][DBLP]
    Higher-Order and Symbolic Computation, 2002, v:15, n:2-3, pp:209-234 [Journal]
  34. Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers
    Secure program partitioning. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 2002, v:20, n:3, pp:283-328 [Journal]
  35. Andrew C. Myers, Barbara Liskov
    Protecting privacy using the decentralized label model. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 2000, v:9, n:4, pp:410-442 [Journal]
  36. Alan Shieh, Andrew C. Myers, Emin Gün Sirer
    Trickles: A Stateless Network Stack for Improved Scalability, Resilience, and Flexibility. [Citation Graph (0, 0)][DBLP]
    NSDI, 2005, pp:- [Conf]
  37. Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, Xin Zheng
    Secure web application via automatic partitioning. [Citation Graph (0, 0)][DBLP]
    SOSP, 2007, pp:31-44 [Conf]
  38. Lantian Zheng, Andrew C. Myers
    Dynamic security labels and static information flow control. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:67-84 [Journal]

  39. End-to-End Enforcement of Erasure and Declassification. [Citation Graph (, )][DBLP]


  40. Civitas: A Secure Remote Voting System. [Citation Graph (, )][DBLP]


  41. 07091 Executive Summary - Mobility, Ubiquity and Security. [Citation Graph (, )][DBLP]


  42. 07091 Abstracts Collection - Mobility, Ubiquity and Security. [Citation Graph (, )][DBLP]


  43. Securing nonintrusive web encryption through information flow. [Citation Graph (, )][DBLP]


  44. Sharing classes between families. [Citation Graph (, )][DBLP]


  45. Masked types for sound object initialization. [Citation Graph (, )][DBLP]


  46. Fabric: a platform for secure distributed computation and storage. [Citation Graph (, )][DBLP]


  47. Civitas: Toward a Secure Voting System. [Citation Graph (, )][DBLP]


  48. Complete, Safe Information Flow with Decentralized Labels. [Citation Graph (, )][DBLP]


  49. Building secure web applications with automatic partitioning. [Citation Graph (, )][DBLP]


Search in 0.049secs, Finished in 0.050secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002