The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stephen Chong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stephen Chong, Andrew C. Myers
    Security policies for downgrading. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:198-209 [Conf]
  2. Hubie Chen, Stephen Chong
    Owned Policies for Information Security. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:126-138 [Conf]
  3. Stephen Chong, Andrew C. Myers
    Language-Based Information Erasure. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:241-254 [Conf]
  4. Stephen Chong, Andrew C. Myers
    Decentralized Robustness. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:242-256 [Conf]
  5. Kevin R. O'Neill, Michael R. Clarkson, Stephen Chong
    Information-Flow Security for Interactive Programs. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:190-201 [Conf]
  6. Nathaniel Nystrom, Stephen Chong, Andrew C. Myers
    Scalable extensibility via nested inheritance. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 2004, pp:99-115 [Conf]
  7. Stephen Chong, Radu Rugina
    Static Analysis of Accessed Regions in Recursive Data Structures. [Citation Graph (0, 0)][DBLP]
    SAS, 2003, pp:463-482 [Conf]
  8. Lantian Zheng, Stephen Chong, Andrew C. Myers, Steve Zdancewic
    Using Replication and Partitioning to Build Secure Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:236-250 [Conf]
  9. Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, Xin Zheng
    Secure web application via automatic partitioning. [Citation Graph (0, 0)][DBLP]
    SOSP, 2007, pp:31-44 [Conf]
  10. Stephen Chong, Riccardo Pucella
    A Framework for Creating Natural Language User Interfaces for Action-Based Applications [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]

  11. End-to-End Enforcement of Erasure and Declassification. [Citation Graph (, )][DBLP]


  12. Required Information Release. [Citation Graph (, )][DBLP]


  13. Civitas: A Secure Remote Voting System. [Citation Graph (, )][DBLP]


  14. Towards Semantics for Provenance Security. [Citation Graph (, )][DBLP]


  15. Self-identifying sensor data. [Citation Graph (, )][DBLP]


  16. Provenance: a future history. [Citation Graph (, )][DBLP]


  17. Civitas: Toward a Secure Voting System. [Citation Graph (, )][DBLP]


  18. Deriving epistemic conclusions from agent architecture. [Citation Graph (, )][DBLP]


  19. Building secure web applications with automatic partitioning. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002