Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enforcing Language Semantics Using Proof-Carrying Data., , and . IACR Cryptology ePrint Archive, (2013)Inference of Expressive Declassification Policies., and . IEEE Symposium on Security and Privacy, page 180-195. IEEE Computer Society, (2011)AuraConf: a unified approach to authorization and confidentiality.. TLDI, page 45-58. ACM, (2011)Self-identifying sensor data., , and . IPSN, page 82-93. ACM, (2010)AURA: a programming language for authorization and audit., , , , , , and . ICFP, page 27-38. ACM, (2008)Secure Information Flow for Concurrent Programs under Total Store Order., and . CSF, page 19-29. IEEE Computer Society, (2012)Self-Identifying Data for Fair Use., , and . ACM J. Data Inf. Qual., 5 (3): 11:1-11:30 (2015)Relational lenses: a language for updatable views., , and . PODS, page 338-347. ACM, (2006)A Cryptographic Decentralized Label Model., and . S&P, page 192-206. IEEE Computer Society, (2007)Evidence-Based Audit., , , and . CSF, page 177-191. IEEE Computer Society, (2008)