Stephen Chong
Citata da
Citata da
Civitas: Toward a secure voting system
MR Clarkson, S Chong, AC Myers
2008 IEEE Symposium on Security and Privacy (sp 2008), 354-368, 2008
Secure web applications via automatic partitioning
S Chong, J Liu, AC Myers, X Qi, K Vikram, L Zheng, X Zheng
ACM SIGOPS Operating Systems Review 41 (6), 31-44, 2007
Jif: Java information flow
AC Myers, L Zheng, S Zdancewic, S Chong, N Nystrom
Software release. Located at http://www. cs. cornell. edu/jif 2005, 2001
Asynchronous functional reactive programming for GUIs
E Czaplicki, S Chong
34th ACM SIGPLAN Conference on Programming Language Design and …, 2013
SIF: Enforcing Confidentiality and Integrity in Web Applications.
S Chong, K Vikram, AC Myers
USENIX Security Symposium, 1-16, 2007
Security policies for downgrading
S Chong, AC Myers
Proceedings of the 11th ACM conference on Computer and communications …, 2004
Scalable extensibility via nested inheritance
N Nystrom, S Chong, AC Myers
Proceedings of the 19th annual ACM SIGPLAN conference on Object-oriented …, 2004
Provenance: a future history
J Cheney, S Chong, N Foster, M Seltzer, S Vansummeren
Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented …, 2009
Using replication and partitioning to build secure distributed systems
L Zheng, S Chong, AC Myers, S Zdancewic
Security and Privacy, 2003. Proceedings. 2003 Symposium on, 236-250, 2003
Information-flow security for interactive programs
KR O'Neill, MR Clarkson, S Chong
19th IEEE Computer Security Foundations Workshop (CSFW'06), 12 pp.-201, 2006
Truthful mechanisms for agents that value privacy
Y Chen, S Chong, IA Kash, T Moran, S Vadhan
ACM Transactions on Economics and Computation (TEAC) 4 (3), 1-30, 2016
Towards fully automatic placement of security sanitizers and declassifiers
B Livshits, S Chong
Proceedings of the 40th ACM SIGPLAN-SIGACT Symposium on Principles of …, 2013
Jif: Java information flow. Software release
AC Myers, L Zheng, S Zdancewic, S Chong, N Nystrom
Language-based information erasure
S Chong, AC Myers
18th IEEE Computer Security Foundations Workshop (CSFW'05), 241-254, 2005
Precise, dynamic information flow for database-backed applications
J Yang, T Hance, TH Austin, A Solar-Lezama, C Flanagan, S Chong
ACM Sigplan Notices 51 (6), 631-647, 2016
Decentralized robustness
S Chong, AC Myers
19th IEEE Computer Security Foundations Workshop (CSFW'06), 12 pp.-256, 2006
Exploring and enforcing security guarantees via program dependence graphs
A Johnson, L Waye, S Moore, S Chong
ACM SIGPLAN Notices 50 (6), 291-302, 2015
Static analysis for efficient hybrid information-flow control
S Moore, S Chong
2011 IEEE 24th Computer Security Foundations Symposium, 146-160, 2011
End-to-end enforcement of erasure and declassification
S Chong, AC Myers
2008 21st IEEE Computer Security Foundations Symposium, 98-111, 2008
Learning is change in knowledge: Knowledge-based security for dynamic policies
A Askarov, S Chong
2012 IEEE 25th Computer Security Foundations Symposium, 308-322, 2012
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20