Secure Information Flow and Pointer Confinement in a Java-like Language. A Banerjee, DA Naumann CSFW 2, 253, 2002 | 260 | 2002 |
Stack-based access control and secure information flow A Banerjee, DA Naumann Journal of functional programming 15 (2), 131-177, 2005 | 207 | 2005 |
Expressive declassification policies and modular static enforcement A Banerjee, DA Naumann, S Rosenberg 2008 IEEE Symposium on Security and Privacy (sp 2008), 339-353, 2008 | 155 | 2008 |
Friends need a bit more: Maintaining invariants over shared state M Barnett, DA Naumann International Conference on Mathematics of Program Construction, 54-84, 2004 | 152 | 2004 |
Regional logic for local reasoning about global invariants A Banerjee, DA Naumann, S Rosenberg ECOOP 2008–Object-Oriented Programming: 22nd European Conference Paphos …, 2008 | 144 | 2008 |
Representation independence, confinement and access control A Banerjee, DA Naumann Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of …, 2002 | 142 | 2002 |
Ownership confinement ensures representation independence for object-oriented programs A Banerjee, DA Naumann Journal of the ACM (JACM) 52 (6), 894-960, 2005 | 130 | 2005 |
Information flow monitor inlining A Chudnov, DA Naumann 2010 23rd IEEE Computer Security Foundations Symposium, 200-214, 2010 | 102 | 2010 |
Deriving an information flow checker and certifying compiler for java G Barthe, D Naumann, T Rezk 2006 IEEE Symposium on Security and Privacy (S&P'06), 13 pp.-242, 2006 | 87 | 2006 |
From coupling relations to mated invariants for checking information flow DA Naumann Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006 | 80 | 2006 |
History-based access control and secure information flow A Banerjee, DA Naumann International Workshop on Construction and Analysis of Safe, Secure, and …, 2004 | 78 | 2004 |
Beyond stack inspection: A unified access-control and information-flow security model M Pistoia, A Banerjee, DA Naumann 2007 IEEE Symposium on Security and Privacy (SP'07), 149-163, 2007 | 74 | 2007 |
99.44% pure: Useful abstractions in specifications M Barnett, DA Naumann, W Schulte, Q Sun ECOOP workshop on formal techniques for Java-like programs (FTfJP), 2004 | 71 | 2004 |
A weakest precondition semantics for an object-oriented language of refinement A Cavalcanti, DA Naumann FM’99—Formal Methods: World Congress on Formal Methods in the Development …, 1999 | 71 | 1999 |
A weakest precondition semantics for refinement of object-oriented programs A Cavalcanti, DA Naumann IEEE Transactions on Software Engineering 26 (8), 713-728, 2000 | 70 | 2000 |
Inlined information flow monitoring for JavaScript A Chudnov, DA Naumann Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 68 | 2015 |
Using access control for secure information flow in a Java-like language A Banerjee, DA Naumann 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 155-169, 2003 | 67 | 2003 |
Guiding a general-purpose C verifier to prove cryptographic protocols F Dupressoir, AD Gordon, J Jürjens, DA Naumann Journal of Computer Security 22 (5), 823-866, 2014 | 66 | 2014 |
Towards imperative modules: Reasoning about invariants and sharing of mutable state DA Naumann, M Barnett Theoretical Computer Science 365 (1-2), 143-168, 2006 | 65 | 2006 |
Behavioral subtyping, specification inheritance, and modular reasoning GT Leavens, DA Naumann ACM Transactions on Programming Languages and Systems (TOPLAS) 37 (4), 1-88, 2015 | 62 | 2015 |