Author of the publication

Implicit Flows: Can't Live with 'Em, Can't Live without 'Em.

, , , and . ICISS, volume 5352 of Lecture Notes in Computer Science, page 56-70. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A logical specification and analysis for SELinux MLS policy., , , , and . ACM Trans. Inf. Syst. Secur., 13 (3): 26:1-26:31 (2010)Trusted declassification: : high-level policy for a security-typed language., , , and . PLAS, page 65-74. ACM, (2006)Jifclipse: development tools for security-typed languages., , and . PLAS, page 1-10. ACM, (2007)From Languages to Systems: Understanding Practical Application Development in Security-typed Languages., , and . ACSAC, page 153-164. IEEE Computer Society, (2006)From Trusted to Secure: Building and Executing Applications That Enforce System Security., , , and . USENIX Annual Technical Conference, page 205-218. USENIX, (2007)Non-Invasive Methods for Host Certification., , , , and . SecureComm, page 1-10. IEEE, (2006)Noninvasive Methods for Host Certification., , , , and . ACM Trans. Inf. Syst. Secur., (2008)An architecture for enforcing end-to-end access control over web applications., , , , , , , and . SACMAT, page 163-172. ACM, (2010)Implicit Flows: Can't Live with 'Em, Can't Live without 'Em., , , and . ICISS, volume 5352 of Lecture Notes in Computer Science, page 56-70. Springer, (2008)A logical specification and analysis for SELinux MLS policy., , , , and . SACMAT, page 91-100. ACM, (2007)