Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Bandhakavi, Sruthi
add a person with the name Bandhakavi, Sruthi
 

Other publications of authors with the same name

A logic for information flow in object-oriented programs., , and . POPL, page 91-102. ACM, (2006)Informal presentation: a trust management perspective on managing policy updates in security-typed languages., , and . PLAS, page 73-74. ACM, (2007)Super-sticky and declassifiable release policies for flexible information dissemination control., , and . WPES, page 51-58. ACM, (2006)Vetting browser extensions for security vulnerabilities with VEX., , , , , and . Commun. ACM, 54 (9): 91-99 (2011)Automated detection of injection vulnerabilities in web applications. University of Illinois Urbana-Champaign, USA, (2011)Towards Static Flow-Based Declassification for Legacy and Untrusted Programs., , , , and . IEEE Symposium on Security and Privacy, page 93-108. IEEE Computer Society, (2010)A Trust Management Approach for Flexible Policy Management in Security-Typed Languages., , and . CSF, page 33-47. IEEE Computer Society, (2008)CANDID: preventing sql injection attacks using dynamic candidate evaluations., , , and . ACM Conference on Computer and Communications Security, page 12-24. ACM, (2007)VEX: Vetting Browser Extensions for Security Vulnerabilities., , , and . USENIX Security Symposium, page 339-354. USENIX Association, (2010)Analyzing end-to-end network reachability., , , and . Integrated Network Management, page 585-590. IEEE, (2009)