Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Andrew C. Myers
2010 – today
- 2013
[c52]Alvin Cheung, Owen Arden, Samuel Madden, Armando Solar-Lezama, Andrew C. Myers: StatusQuo: Making Familiar Abstractions Perform Using Program Analysis. CIDR 2013
[c51]Chinawat Isradisaikul, Andrew C. Myers: Reconciling exhaustive pattern matching with objects. PLDI 2013: 343-354
[c50]
[c49]Alvin Cheung, Owen Arden, Samuel Madden, Andrew C. Myers: Speeding up database applications with Pyxis. SIGMOD Conference 2013: 969-972- 2012
[j12]Alvin Cheung, Owen Arden, Samuel Madden, Andrew C. Myers: Automatic Partitioning of Database Applications. PVLDB 5(11): 1471-1482 (2012)
[c48]Danfeng Zhang, Aslan Askarov, Andrew C. Myers: Language-based control and mitigation of timing channels. PLDI 2012: 99-110
[c47]Owen Arden, Michael D. George, Jed Liu, K. Vikram, Aslan Askarov, Andrew C. Myers: Sharing Mobile Code Securely with Information Flow Control. IEEE Symposium on Security and Privacy 2012: 191-205
[i1]Alvin Cheung, Owen Arden, Samuel Madden, Andrew C. Myers: Automatic Partitioning of Database Applications. CoRR abs/1208.0271 (2012)- 2011
[j11]Aslan Askarov, Andrew C. Myers: Attacker Control and Impact for Confidentiality and Integrity. Logical Methods in Computer Science 7(3) (2011)
[c46]Danfeng Zhang, Aslan Askarov, Andrew C. Myers: Predictive mitigation of timing channels in interactive systems. ACM Conference on Computer and Communications Security 2011: 563-574- 2010
[c45]Aslan Askarov, Danfeng Zhang, Andrew C. Myers: Predictive black-box mitigation of timing channels. ACM Conference on Computer and Communications Security 2010: 297-307
[c44]
[c43]
[p1]Andrew C. Myers: Using Security Policies to Write Secure Software. Logics and Languages for Reliability and Security 2010: 225-261
2000 – 2009
- 2009
[j10]Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, Xin Zheng: Building secure web applications with automatic partitioning. Commun. ACM 52(2): 79-87 (2009)
[j9]Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider: Quantifying information flow with beliefs. Journal of Computer Security 17(5): 655-701 (2009)
[c42]
[c41]
[c40]Jed Liu, Michael D. George, K. Vikram, Xin Qi, Lucas Waye, Andrew C. Myers: Fabric: a platform for secure distributed computation and storage. SOSP 2009: 321-334- 2008
[j8]Alan Shieh, Andrew C. Myers, Emin Gün Sirer: A stateless approach to connection-oriented protocols. ACM Trans. Comput. Syst. 26(3) (2008)
[c39]Stephen Chong, Andrew C. Myers: End-to-End Enforcement of Erasure and Declassification. CSF 2008: 98-111
[c38]Lantian Zheng, Andrew C. Myers: Securing nonintrusive web encryption through information flow. PLAS 2008: 125-134
[c37]Michael R. Clarkson, Stephen Chong, Andrew C. Myers: Civitas: Toward a Secure Voting System. IEEE Symposium on Security and Privacy 2008: 354-368- 2007
[j7]Lantian Zheng, Andrew C. Myers: Dynamic security labels and static information flow control. Int. J. Inf. Sec. 6(2-3): 67-84 (2007)
[c36]Gilles Barthe, Heiko Mantel, Peter Müller, Andrew C. Myers, Andrei Sabelfeld: 07091 Executive Summary - Mobility, Ubiquity and Security. Mobility, Ubiquity and Security 2007
[c35]Gilles Barthe, Heiko Mantel, Peter Müller, Andrew C. Myers, Andrei Sabelfeld: 07091 Abstracts Collection - Mobility, Ubiquity and Security. Mobility, Ubiquity and Security 2007
[c34]Michael E. Clarkson, Stephen Chong, Andrew C. Myers: Civitas: A Secure Remote Voting System. Frontiers of Electronic Voting 2007
[c33]Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, Xin Zheng: Secure web application via automatic partitioning. SOSP 2007: 31-44
[e1]Gilles Barthe, Heiko Mantel, Peter Müller, Andrew C. Myers, Andrei Sabelfeld (Eds.): Mobility, Ubiquity and Security, 25.02. - 02.03.2007. Dagstuhl Seminar Proceedings 07091, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007- 2006
[j6]Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic: Enforcing Robust Declassification and Qualified Robustness. Journal of Computer Security 14(2): 157-196 (2006)
[c32]
[c31]Nathaniel Nystrom, Xin Qi, Andrew C. Myers: J&: nested intersection for scalable software composition. OOPSLA 2006: 21-36
[c30]- 2005
[c29]Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider: Belief in Information Flow. CSFW 2005: 31-45
[c28]
[c27]Lantian Zheng, Andrew C. Myers: End-to-End Availability Policies and Noninterference. CSFW 2005: 272-286
[c26]
[c25]Alan Shieh, Andrew C. Myers, Emin Gün Sirer: Trickles: A Stateless Network Stack for Improved Scalability, Resilience, and Flexibility. NSDI 2005
[c24]Andrew C. Myers: Making distributed systems secure with program analysis and transformation. PASTE 2005: 47
[c23]Chavdar Botev, Hubert Chao, Theodore Chao, Yim Cheng, Raymond Doyle, Sergey Grankin, Jon Guarino, Saikat Guha, Pei-Chen Lee, Dan Perry, Christopher Re, Ilya Rifkin, Tingyan Yuan, Dora Abdullah, Kathy Carpenter, David Gries, Dexter Kozen, Andrew C. Myers, David I. Schwartz, Jayavel Shanmugasundaram: Supporting workflow in a course management system. SIGCSE 2005: 262-266- 2004
[c22]Stephen Chong, Andrew C. Myers: Security policies for downgrading. ACM Conference on Computer and Communications Security 2004: 198-209
[c21]Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic: Enforcing Robust Declassification. CSFW 2004: 172-186
[c20]Lantian Zheng, Andrew C. Myers: Dynamic Security Labels and Noninterference (Extended Abstract). Formal Aspects in Security and Trust 2004: 27-40
[c19]Nathaniel Nystrom, Stephen Chong, Andrew C. Myers: Scalable extensibility via nested inheritance. OOPSLA 2004: 99-115- 2003
[j5]Andrei Sabelfeld, Andrew C. Myers: Language-based information-flow security. IEEE Journal on Selected Areas in Communications 21(1): 5-19 (2003)
[c18]Nathaniel Nystrom, Michael R. Clarkson, Andrew C. Myers: Polyglot: An Extensible Compiler Framework for Java. CC 2003: 138-152
[c17]Steve Zdancewic, Andrew C. Myers: Observational Determinism for Concurrent Program Security. CSFW 2003: 29-
[c16]
[c15]
[c14]Lantian Zheng, Stephen Chong, Andrew C. Myers, Steve Zdancewic: Using Replication and Partitioning to Build Secure Distributed Systems. IEEE Symposium on Security and Privacy 2003: 236-250- 2002
[j4]Steve Zdancewic, Andrew C. Myers: Secure Information Flow via Linear Continuations. Higher-Order and Symbolic Computation 15(2-3): 209-234 (2002)
[j3]Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers: Secure program partitioning. ACM Trans. Comput. Syst. 20(3): 283-328 (2002)- 2001
[c13]
[c12]
[c11]
[c10]Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers: Untrusted Hosts and Confidentiality: Secure Program Partitioning. SOSP 2001: 1-14- 2000
[j2]Andrew C. Myers, Barbara Liskov: Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol. 9(4): 410-442 (2000)
1990 – 1999
- 1999
[c9]- 1998
[c8]Andrew C. Myers, Barbara Liskov: Complete, Safe Information Flow with Decentralized Labels. IEEE Symposium on Security and Privacy 1998: 186-197- 1997
[c7]
[c6]Miguel Castro, Atul Adya, Barbara Liskov, Andrew C. Myers: HAC: Hybrid Adaptive Caching for Distributed Storage Systems. SOSP 1997: 102-115
[c5]Andrew C. Myers, Barbara Liskov: A Decentralized Model for Information Flow Control. SOSP 1997: 129-142- 1996
[c4]Barbara Liskov, Atul Adya, Miguel Castro, Mark Day, Sanjay Ghemawat, Robert Gruber, Umesh Maheshwari, Andrew C. Myers, Liuba Shrira: Safe and Efficient Sharing of Persistent Objects in Thor. SIGMOD Conference 1996: 318-329- 1995
[c3]
[c2]Mark Day, Robert Gruber, Barbara Liskov, Andrew C. Myers: Subtypes vs. Where Clauses: Constraining Parametric Polymorphism. OOPSLA 1995: 156-168- 1993
[j1]Mark Day, Barbara Liskov, Umesh Maheshwari, Andrew C. Myers: References to Remote Mobile Objects in Thor. LOPLAS 2(1-4): 115-126 (1993)
[c1]Andrew C. Myers: Resolving the Integrity/Performance Conflict. Workshop on Workstation Operating Systems 1993: 156-159
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 10:57 CEST by the dblp team



