Follow
Andrew C. Myers
Andrew C. Myers
Professor of Computer Science, Cornell University
Verified email at cs.cornell.edu - Homepage
Title
Cited by
Cited by
Year
Language-based information-flow security
A Sabelfeld, AC Myers
Selected Areas in Communications, IEEE Journal on 21 (1), 5-19, 2003
27852003
JFlow: Practical mostly-static information flow control
AC Myers
ACM Symposium on Principles of Programming Languages (POPL), 228-241, 1999
15791999
Protecting privacy using the decentralized label model
AC Myers, B Liskov
ACM Transactions on Software Engineering and Methodology (TOSEM) 9 (4), 410-442, 2000
8332000
A decentralized model for information flow control
AC Myers, B Liskov
ACM Symposium on Operating Systems Principles (SOSP) 31 (5), 129-142, 1997
7671997
Civitas: Toward a secure voting system
MR Clarkson, S Chong, AC Myers
IEEE Symposium on Security and Privacy, 354-368, 2008
6052008
Polyglot: An extensible compiler framework for Java
N Nystrom, M Clarkson, AC Myers
Compiler Construction, 138-152, 2003
5532003
Parameterized types for Java
AC Myers, JA Bank, B Liskov
ACM Symposium on Principles of Programming Languages (POPL), 132-145, 1997
361*1997
Secure web applications via automatic partitioning
S Chong, J Liu, AC Myers, X Qi, K Vikram, L Zheng, X Zheng
ACM Symposium on Operating Systems Principles (SOSP) 41 (6), 31-44, 2007
3552007
Observational determinism for concurrent program security
S Zdancewic, AC Myers
16th IEEE Computer Security Foundations Workshop, 29-43, 2003
3232003
Jif: Java information flow
AC Myers, L Zheng, S Zdancewic, S Chong, N Nystrom
Software release. Located at http://www.cs.cornell.edu/jif, 2001
3192001
Robust declassification
S Zdancewic, AC Myers
14th IEEE Computer Security Foundations Workshop, 15-23, 2001
3042001
A model for delimited information release
A Sabelfeld, AC Myers
Software Security-Theories and Systems: Second Mext-NSF-JSPS International …, 2004
3002004
A hardware design language for timing-sensitive information-flow security
D Zhang, Y Wang, GE Suh, AC Myers
ASPLOS: Proc. 20th Int'l Conf. on Architectural Support for Programming …, 2015
2982015
Complete, safe information flow with decentralized labels
AC Myers, B Liskov
Security and Privacy, Proceedings 1998 IEEE Symposium on, 186-197, 1998
2691998
SIF: Enforcing confidentiality and integrity in web applications
S Chong, K Vikram, AC Myers
16th USENIX Security Symposium, 1-16, 2007
2432007
Secure program partitioning
S Zdancewic, L Zheng, N Nystrom, AC Myers
ACM Transactions on Computer Systems (TOCS) 20 (3), 283-328, 2002
2242002
Predictive black-box mitigation of timing channels
A Askarov, D Zhang, AC Myers
17th ACM Conference on Computer and Communications Security (CCS), 297-307, 2010
2142010
Safe and efficient sharing of persistent objects in Thor
B Liskov, A Adya, M Castro, M Day, S Ghemawat, R Gruber, ...
ACM SIGMOD Record 25 (2), 318-329, 1996
2091996
Fabric: A platform for secure distributed computation and storage
J Liu, MD George, K Vikram, X Qi, L Waye, AC Myers
22nd ACM Symposium on Operating Systems Principles (SOSP), 321-334, 2009
1962009
Security policies for downgrading
S Chong, AC Myers
11th ACM Conference on Computer and Communications Security, 198-209, 2004
1942004
The system can't perform the operation now. Try again later.
Articles 1–20