|
Search the dblp DataBase
Jay Ligatti:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti
Control-flow integrity. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:340-353 [Conf]
- Jay Ligatti, Lujo Bauer, David Walker
Enforcing Non-safety Security Policies with Program Monitors. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:355-373 [Conf]
- Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti
A Theory of Secure Control Flow. [Citation Graph (0, 0)][DBLP] ICFEM, 2005, pp:111-124 [Conf]
- David Walker, Lester W. Mackey, Jay Ligatti, George A. Reis, David I. August
Static typing for a faulty lambda calculus. [Citation Graph (0, 0)][DBLP] ICFP, 2006, pp:38-49 [Conf]
- David Walker, Steve Zdancewic, Jay Ligatti
A theory of aspects. [Citation Graph (0, 0)][DBLP] ICFP, 2003, pp:127-139 [Conf]
- Lujo Bauer, Jay Ligatti, David Walker
Composing security policies with polymer. [Citation Graph (0, 0)][DBLP] PLDI, 2005, pp:305-314 [Conf]
- Jay Ligatti, Lujo Bauer, David Walker
Edit automata: enforcement mechanisms for run-time security policies. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:2-16 [Journal]
- Jay Ligatti, David Walker, Steve Zdancewic
A type-theoretic interpretation of pointcuts and advice. [Citation Graph (0, 0)][DBLP] Sci. Comput. Program., 2006, v:63, n:3, pp:240-266 [Journal]
- Frances Perry, Lester W. Mackey, George A. Reis, Jay Ligatti, David I. August, David Walker
Fault-tolerant typed assembly language. [Citation Graph (0, 0)][DBLP] PLDI, 2007, pp:42-53 [Conf]
A Theory of Runtime Enforcement, with Results. [Citation Graph (, )][DBLP]
Inline Visualization of Concerns. [Citation Graph (, )][DBLP]
LoPSiL: A Location-Based Policy-Specification Language. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|