2009 |
15 | EE | Stephen Chong:
Towards Semantics for Provenance Security.
Workshop on the Theory and Practice of Provenance 2009 |
14 | EE | Stephen Chong,
Jed Liu,
Andrew C. Myers,
Xin Qi,
K. Vikram,
Lantian Zheng,
Xin Zheng:
Building secure web applications with automatic partitioning.
Commun. ACM 52(2): 79-87 (2009) |
2008 |
13 | EE | Stephen Chong,
Andrew C. Myers:
End-to-End Enforcement of Erasure and Declassification.
CSF 2008: 98-111 |
12 | EE | Michael R. Clarkson,
Stephen Chong,
Andrew C. Myers:
Civitas: Toward a Secure Voting System.
IEEE Symposium on Security and Privacy 2008: 354-368 |
2007 |
11 | EE | Michael E. Clarkson,
Stephen Chong,
Andrew C. Myers:
Civitas: A Secure Remote Voting System.
Frontiers of Electronic Voting 2007 |
10 | EE | Stephen Chong,
Jed Liu,
Andrew C. Myers,
Xin Qi,
K. Vikram,
Lantian Zheng,
Xin Zheng:
Secure web application via automatic partitioning.
SOSP 2007: 31-44 |
2006 |
9 | EE | Kevin R. O'Neill,
Michael R. Clarkson,
Stephen Chong:
Information-Flow Security for Interactive Programs.
CSFW 2006: 190-201 |
8 | EE | Stephen Chong,
Andrew C. Myers:
Decentralized Robustness.
CSFW 2006: 242-256 |
2005 |
7 | EE | Stephen Chong,
Andrew C. Myers:
Language-Based Information Erasure.
CSFW 2005: 241-254 |
2004 |
6 | EE | Stephen Chong,
Andrew C. Myers:
Security policies for downgrading.
ACM Conference on Computer and Communications Security 2004: 198-209 |
5 | EE | Hubie Chen,
Stephen Chong:
Owned Policies for Information Security.
CSFW 2004: 126-138 |
4 | EE | Nathaniel Nystrom,
Stephen Chong,
Andrew C. Myers:
Scalable extensibility via nested inheritance.
OOPSLA 2004: 99-115 |
3 | EE | Stephen Chong,
Riccardo Pucella:
A Framework for Creating Natural Language User Interfaces for Action-Based Applications
CoRR abs/cs/0412065: (2004) |
2003 |
2 | EE | Lantian Zheng,
Stephen Chong,
Andrew C. Myers,
Steve Zdancewic:
Using Replication and Partitioning to Build Secure Distributed Systems.
IEEE Symposium on Security and Privacy 2003: 236-250 |
1 | EE | Stephen Chong,
Radu Rugina:
Static Analysis of Accessed Regions in Recursive Data Structures.
SAS 2003: 463-482 |