Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing nonintrusive web encryption through information flow., and . PLAS, page 125-134. ACM, (2008)Secure web applications via automatic partitioning, , , , , , and . SIGOPS Oper. Syst. Rev., (October 2007)Dynamic Security Labels and Noninterference (Extended Abstract)., and . Formal Aspects in Security and Trust, volume 173 of IFIP, page 27-40. Springer, (2004)Secure program partitioning., , , and . ACM Trans. Comput. Syst., 20 (3): 283-328 (2002)A Language-Based Approach to Secure Quorum Replication., and . PLAS@ECOOP, page 27. ACM, (2014)Using Replication and Partitioning to Build Secure Distributed Systems., , , and . S&P, page 236-250. IEEE Computer Society, (2003)End-to-End Availability Policies and Noninterference., and . CSFW, page 272-286. IEEE Computer Society, (2005)Untrusted Hosts and Confidentiality: Secure Program Partitioning., , , and . SOSP, page 1-14. ACM, (2001)Operating System Review 35(5).Dynamic security labels and static information flow control., and . Int. J. Inf. Sec., 6 (2-3): 67-84 (2007)Making Distributed Computation Secure by Construction.. Cornell University, USA, (2007)