|
Search the dblp DataBase
Stephen Chong:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Stephen Chong, Andrew C. Myers
Security policies for downgrading. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:198-209 [Conf]
- Hubie Chen, Stephen Chong
Owned Policies for Information Security. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:126-138 [Conf]
- Stephen Chong, Andrew C. Myers
Language-Based Information Erasure. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:241-254 [Conf]
- Stephen Chong, Andrew C. Myers
Decentralized Robustness. [Citation Graph (0, 0)][DBLP] CSFW, 2006, pp:242-256 [Conf]
- Kevin R. O'Neill, Michael R. Clarkson, Stephen Chong
Information-Flow Security for Interactive Programs. [Citation Graph (0, 0)][DBLP] CSFW, 2006, pp:190-201 [Conf]
- Nathaniel Nystrom, Stephen Chong, Andrew C. Myers
Scalable extensibility via nested inheritance. [Citation Graph (0, 0)][DBLP] OOPSLA, 2004, pp:99-115 [Conf]
- Stephen Chong, Radu Rugina
Static Analysis of Accessed Regions in Recursive Data Structures. [Citation Graph (0, 0)][DBLP] SAS, 2003, pp:463-482 [Conf]
- Lantian Zheng, Stephen Chong, Andrew C. Myers, Steve Zdancewic
Using Replication and Partitioning to Build Secure Distributed Systems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:236-250 [Conf]
- Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, Xin Zheng
Secure web application via automatic partitioning. [Citation Graph (0, 0)][DBLP] SOSP, 2007, pp:31-44 [Conf]
- Stephen Chong, Riccardo Pucella
A Framework for Creating Natural Language User Interfaces for Action-Based Applications [Citation Graph (0, 0)][DBLP] CoRR, 2004, v:0, n:, pp:- [Journal]
End-to-End Enforcement of Erasure and Declassification. [Citation Graph (, )][DBLP]
Required Information Release. [Citation Graph (, )][DBLP]
Civitas: A Secure Remote Voting System. [Citation Graph (, )][DBLP]
Towards Semantics for Provenance Security. [Citation Graph (, )][DBLP]
Self-identifying sensor data. [Citation Graph (, )][DBLP]
Provenance: a future history. [Citation Graph (, )][DBLP]
Civitas: Toward a Secure Voting System. [Citation Graph (, )][DBLP]
Deriving epistemic conclusions from agent architecture. [Citation Graph (, )][DBLP]
Building secure web applications with automatic partitioning. [Citation Graph (, )][DBLP]
Search in 0.032secs, Finished in 0.034secs
|