Dr. Android and Mr. Hide: fine-grained permissions in android applications J Jeon, KK Micinski, JA Vaughan, A Fogel, N Reddy, JS Foster, T Millstein Proceedings of the second ACM workshop on Security and privacy in …, 2012 | 343 | 2012 |
Relational lenses: a language for updatable views A Bohannon, BC Pierce, JA Vaughan Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on …, 2006 | 292 | 2006 |
Aura: A programming language for authorization and audit L Jia, JA Vaughan, K Mazurak, J Zhao, L Zarko, J Schorr, S Zdancewic ACM Sigplan Notices 43 (9), 27-38, 2008 | 133 | 2008 |
Evidence-based audit JA Vaughan, L Jia, K Mazurak, S Zdancewic 2008 21st IEEE Computer Security Foundations Symposium, 177-191, 2008 | 94 | 2008 |
Dr. Android and Mr. Hide: Fine-grained security policies on unmodified Android J Jeon, KK Micinski, JA Vaughan, N Reddy, Y Zhu, JS Foster, T Millstein UM Computer Science Department; CS-TR-5006, 2012 | 70 | 2012 |
Factors affecting energy deposition and expansion in single wire low current experiments PU Duselis, JA Vaughan, BR Kusse Physics of Plasmas 11 (8), 4025-4031, 2004 | 67 | 2004 |
A cryptographic decentralized label model JA Vaughan, S Zdancewic 2007 IEEE Symposium on Security and Privacy (SP'07), 192-206, 2007 | 47 | 2007 |
Inference of expressive declassification policies JA Vaughan, S Chong 2011 IEEE Symposium on Security and Privacy, 180-195, 2011 | 38 | 2011 |
Self-identifying sensor data S Chong, C Skalka, JA Vaughan Proceedings of the 9th ACM/IEEE International Conference on Information …, 2010 | 38 | 2010 |
Application-centric security policies on unmodified Android N Reddy, J Jeon, J Vaughan, T Millstein, J Foster UCLA Computer Science Department, Tech. Rep 110017, 2011 | 35 | 2011 |
Enforcing language semantics using proof-carrying data S Chong, E Tromer, JA Vaughan Cryptology ePrint Archive, 2013 | 18 | 2013 |
Secure information flow for concurrent programs under total store order JA Vaughan, T Millstein 2012 IEEE 25th Computer Security Foundations Symposium, 19-29, 2012 | 16 | 2012 |
AuraConf: a unified approach to authorization and confidentiality JA Vaughan Proceedings of the 7th ACM SIGPLAN workshop on Types in language design and …, 2011 | 13* | 2011 |
SML2Java: a source to source translator J Koser, H Larsen, JA Vaughan Draft Proceedings of the Workshop on Declarative Programming in the Context …, 2003 | 12 | 2003 |
Self-identifying data for fair use S Chong, C Skalka, JA Vaughan Journal of Data and Information Quality (JDIQ) 5 (3), 1-30, 2015 | 8 | 2015 |
Aura: Programming with authorization and audit JA Vaughan University of Pennsylvania, 2009 | 5 | 2009 |
AURA: Preliminary technical results L Jia, JA Vaughan, K Mazurak, J Zhao, L Zarko, J Schorr, SA Zdancewic | 4 | 2008 |
A platform for expressive and secure data sharing with untrusted third parties E Griffis, JA Vaughan, T Millstein Technical Report 120017, University of California, Los Angeles, 2011 | 3 | 2011 |
Secure information flow for concurrent programs under total store order: Supplemental technical material JA Vaughan, T Millstein Technical Report 120007, Computer Science Department, 2012 | 2 | 2012 |
A framework for internalizing relations into type theory P Fu, A Stump, J Vaughan PSATTT'11: International Workshop on Proof-Search in Axiomatic Theories and …, 2011 | 2 | 2011 |