other persons with the same name:
2008 | ||
---|---|---|
33 | EE | Anindya Banerjee, David A. Naumann, Stan Rosenberg: Regional Logic for Local Reasoning about Global Invariants. ECOOP 2008: 387-411 |
32 | EE | Anindya Banerjee, David A. Naumann, Stan Rosenberg: Expressive Declassification Policies and Modular Static Enforcement. IEEE Symposium on Security and Privacy 2008: 339-353 |
31 | EE | Anindya Banerjee, Michael Barnett, David A. Naumann: Boogie Meets Regions: A Verification Experience Report. VSTTE 2008: 177-191 |
2007 | ||
30 | EE | Torben Amtoft, Anindya Banerjee: Verification condition generation for conditional information flow. FMSE 2007: 2-11 |
29 | EE | Marco Pistoia, Anindya Banerjee, David A. Naumann: Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model. IEEE Symposium on Security and Privacy 2007: 149-163 |
28 | EE | Anindya Banerjee, David A. Naumann, Stan Rosenberg: Towards a logical account of declassification. PLAS 2007: 61-66 |
27 | EE | Venkatesh Prasad Ranganath, Torben Amtoft, Anindya Banerjee, John Hatcliff, Matthew B. Dwyer: A new foundation for control dependence and slicing for modern program structures. ACM Trans. Program. Lang. Syst. 29(5): (2007) |
26 | EE | Anindya Banerjee, Roberto Giacobazzi, Isabella Mastroeni: What You Lose is What You Leak: Information Leakage in Declassification Policies. Electr. Notes Theor. Comput. Sci. 173: 47-66 (2007) |
25 | EE | Torben Amtoft, Anindya Banerjee: A logic for information flow analysis with an application to forward slicing of simple imperative programs. Sci. Comput. Program. 64(1): 3-28 (2007) |
2006 | ||
24 | EE | Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jensen, David A. Schmidt: Automata-Based Confidentiality Monitoring. ASIAN 2006: 75-89 |
23 | EE | Torben Amtoft, Sruthi Bandhakavi, Anindya Banerjee: A logic for information flow in object-oriented programs. POPL 2006: 91-102 |
2005 | ||
22 | Anindya Banerjee, Heiko Mantel, David A. Naumann, Andrei Sabelfeld: Language-Based Security, 5.-10. October 2003 IBFI, Schloss Dagstuhl, Germany 2005 | |
21 | EE | Anindya Banerjee, David A. Naumann: State Based Ownership, Reentrance, and Encapsulation. ECOOP 2005: 387-411 |
20 | EE | Venkatesh Prasad Ranganath, Torben Amtoft, Anindya Banerjee, Matthew B. Dwyer, John Hatcliff: A New Foundation for Control-Dependence and Slicing for Modern Program Structures. ESOP 2005: 77-93 |
19 | EE | Anindya Banerjee, David A. Naumann: Ownership confinement ensures representation independence for object-oriented programs. J. ACM 52(6): 894-960 (2005) |
18 | EE | Anindya Banerjee, David A. Naumann: Stack-based access control and secure information flow. J. Funct. Program. 15(2): 131-177 (2005) |
2004 | ||
17 | EE | Anindya Banerjee, David A. Naumann: History-Based Access Control and Secure Information Flow. CASSIS 2004: 27-48 |
16 | EE | Torben Amtoft, Anindya Banerjee: Information Flow Analysis in Logical Form. SAS 2004: 100-115 |
15 | EE | Qi Sun, Anindya Banerjee, David A. Naumann: Modular and Constraint-Based Information Flow Inference for an Object-Oriented Language. SAS 2004: 84-99 |
2003 | ||
14 | EE | Anindya Banerjee, David A. Naumann: Using Access Control for Secure Information Flow in a Java-like Language. CSFW 2003: 155-169 |
13 | EE | Anindya Banerjee, Heiko Mantel, David A. Naumann, Andrei Sabelfeld: 03411 Abstracts Collection - Language Based Security. Language Based Security 2003 |
12 | EE | Anindya Banerjee, Heiko Mantel, David A. Naumann, Andrei Sabelfeld: 03411 Final Report - Language Based Security. Language Based Security 2003 |
11 | Anindya Banerjee, Thomas P. Jensen: Modular Control-Flow Analysis with Rank 2 Intersection Types. Mathematical Structures in Computer Science 13(1): 87-124 (2003) | |
2002 | ||
10 | EE | Anindya Banerjee, David A. Naumann: Secure Information Flow and Pointer Confinement in a Java-like Language. CSFW 2002: 253- |
9 | EE | Anindya Banerjee, David A. Naumann: Representation independence, confinement and access control [extended abstract]. POPL 2002: 166-177 |
8 | EE | Anindya Banerjee, David A. Naumann: Ownership Confinement Ensures Representation Independence for Object-Oriented Programs CoRR cs.PL/0212003: (2002) |
2001 | ||
7 | EE | Anindya Banerjee, Nevin Heintze, Jon G. Riecke: Design and Correctness of Program Transformations Based on Control-Flow Analysis. TACS 2001: 420-447 |
1999 | ||
6 | EE | Anindya Banerjee, Nevin Heintze, Jon G. Riecke: Region Analysis and the Polymorphic Lambda Calculus. LICS 1999: 88-97 |
5 | EE | Martín Abadi, Anindya Banerjee, Nevin Heintze, Jon G. Riecke: A Core Calculus of Dependency. POPL 1999: 147-160 |
1998 | ||
4 | Anindya Banerjee, David A. Schmidt: Stackability in the Simply-Typed Call-by-Value lambda Calculus. Sci. Comput. Program. 31(1): 47-73 (1998) | |
1997 | ||
3 | Anindya Banerjee: A Modular, Polyvariant, and Type-Based Closure Analysis. ICFP 1997: 1-10 | |
1994 | ||
2 | Anindya Banerjee, David A. Schmidt: Stackability in the Simply-Typed Call-by-Value Lambda Calculus. SAS 1994: 131-146 | |
1993 | ||
1 | Anindya Banerjee, David A. Schmidt: A Categorical Interpretation of Landin's Correspondence Principle. MFPS 1993: 587-602 |
1 | Martín Abadi | [5] |
2 | Torben Amtoft (Torben Amtoft Hansen) | [16] [20] [23] [25] [27] [30] |
3 | Sruthi Bandhakavi | [23] |
4 | Michael Barnett | [31] |
5 | Matthew B. Dwyer | [20] [27] |
6 | Roberto Giacobazzi | [26] |
7 | Gurvan Le Guernic | [24] |
8 | John Hatcliff | [20] [27] |
9 | Nevin Heintze | [5] [6] [7] |
10 | Thomas P. Jensen | [11] [24] |
11 | Heiko Mantel | [12] [13] [22] |
12 | Isabella Mastroeni | [26] |
13 | David A. Naumann | [8] [9] [10] [12] [13] [14] [15] [17] [18] [19] [21] [22] [28] [29] [31] [32] [33] |
14 | Marco Pistoia | [29] |
15 | Venkatesh Prasad Ranganath | [20] [27] |
16 | Jon G. Riecke | [5] [6] [7] |
17 | Stan Rosenberg | [28] [32] [33] |
18 | Andrei Sabelfeld | [12] [13] [22] |
19 | David A. Schmidt | [1] [2] [4] [24] |
20 | Qi Sun | [15] |