Author of the publication

Sanitizing Sensitive Data: How to Get It Right (or at Least Less Wrong...).

. Ada-Europe, volume 10300 of Lecture Notes in Computer Science, page 37-52. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Are We There Yet? 20 Years of Industrial Theorem Proving with SPARK., and . ITP, volume 8558 of Lecture Notes in Computer Science, page 17-26. Springer, (2014)Re-engineering a Safety-Critical Application Using SPARK 95 and GNORT., and . Ada-Europe, volume 1622 of Lecture Notes in Computer Science, page 39-51. Springer, (1999)Co-Developing Programs and Their Proof of Correctness., , , and . Commun. ACM, 67 (3): 84-94 (March 2024)Smart Certification of Mixed Criticality Systems., , and . Ada-Europe, volume 3555 of Lecture Notes in Computer Science, page 144-155. Springer, (2005)SPARK 2014 and GNATprove - A competition report from builders of an industrial-strength verifying compiler., , , and . Int. J. Softw. Tools Technol. Transf., 17 (6): 695-707 (2015)OOT, DO-178C and SPARK., and . Ada-Europe, volume 6652 of Lecture Notes in Computer Science, page 206-210. Springer, (2011)SPARKSkein: A Formal and Fast Reference Implementation of Skein., , and . SBMF, volume 7021 of Lecture Notes in Computer Science, page 16-27. Springer, (2011)Enforcing security and safety models with an information flow analysis tool., and . SIGAda, page 39-46. ACM, (2004)Static verification and extreme programming., and . SIGAda, page 4-9. ACM, (2003)Industrial strength exception freedom., and . SIGAda, page 1-9. ACM, (2002)