Towards a theory of accountability and audit R Jagadeesan, A Jeffrey, C Pitcher, J Riely Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 147 | 2009 |
Specifications of a high-level conflict-free firewall policy language for multi-domain networks B Zhang, E Al-Shaer, R Jagadeesan, J Riely, C Pitcher Proceedings of the 12th ACM symposium on Access control models and …, 2007 | 110 | 2007 |
Local memory via layout randomization R Jagadeesan, C Pitcher, J Rathke, J Riely 2011 IEEE 24th Computer Security Foundations Symposium, 161-174, 2011 | 61 | 2011 |
Generative operational semantics for relaxed memory models R Jagadeesan, C Pitcher, J Riely Programming Languages and Systems: 19th European Symposium on Programming …, 2010 | 56 | 2010 |
Timed Constraint Programming: A Declarative Approach to Usage Control C Pitcher, V Saraswat PPDP..., 164, 2005 | 38* | 2005 |
Visibly pushdown expression effects for XML stream processing C Pitcher Programming Language Technologies for XML 1060, 1-14, 2005 | 34 | 2005 |
Similarity and bisimilarity for countable non-determinism and higher-order functions SB Lassen, CS Pitcher Electronic Notes in Theoretical Computer Science 10, 246-266, 1998 | 24 | 1998 |
Open bisimulation for aspects R Jagadeesan, C Pitcher, J Riely Proceedings of the 6th international conference on Aspect-oriented software …, 2007 | 22 | 2007 |
Functional programming and erratic non-determinism CS Pitcher University of Oxford, 2001 | 18 | 2001 |
An Extensible Approach to Session Polymorphism M Goto, R Jagadeesan, A Jeffrey, C Pitcher, J Riely Mathematical Structures in Computer Science, 44, 2011 | 17* | 2011 |
Do As I SaY! Programmatic access control with explicit identities A Cirillo, R Jagadeesan, C Pitcher, J Riely 20th IEEE Computer Security Foundations Symposium (CSF'07), 16-30, 2007 | 17 | 2007 |
Quarantining weakness: compositional reasoning under relaxed memory models R Jagadeesan, G Petri, C Pitcher, J Riely Programming Languages and Systems: 22nd European Symposium on Programming …, 2013 | 16 | 2013 |
Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects A Cirillo, R Jagadeesan, C Pitcher, J Riely European Symposium on Programming, 208-223, 2008 | 15 | 2008 |
Open bisimulation for aspects R Jagadeesan, C Pitcher, J Riely Transactions on Aspect-Oriented Software Development V, 72-132, 2009 | 12 | 2009 |
Lambda-RBAC: Programming with role-based access control R Jagadeesan, A Jeffrey, C Pitcher, J Riely Logical Methods in Computer Science 4, 2008 | 7 | 2008 |
Dynamic policy discovery with remote attestation C Pitcher, J Riely Foundations of Software Science and Computation Structures: 9th …, 2006 | 6 | 2006 |
An Extensible Approach to Session Polymorphism. MSCS 26, 3 (2016), 465–509 MA Goto, R Jagadeesan, A Jeffrey, C Pitcher, J Riely | 5 | 2016 |
Succour to the Confused Deputy: Types for Capabilities R Jagadeesan, C Pitcher, J Riely Programming Languages and Systems: 10th Asian Symposium, APLAS 2012, Kyoto …, 2012 | 3 | 2012 |
Certificates for Verifiable Forensics R Jagadeesan, CM Lubinski, C Pitcher, J Riely, C Winebrinner 2014 IEEE 27th Computer Security Foundations Symposium, 33-47, 2014 | 2 | 2014 |
Types for relaxed memory models using correspondence assertions M Goto, R Jagadeesan, C Pitcher, J Riely Submitted for publication, 0 | 2 | |