![]() |
Penn State
List of publications from the DBLP Bibliography Server - FAQother persons with the same name:
| 2008 | ||
|---|---|---|
| 6 | EE | Dave King, Boniface Hicks, Michael Hicks, Trent Jaeger: Implicit Flows: Can't Live with 'Em, Can't Live without 'Em. ICISS 2008: 56-70 |
| 5 | EE | Dave King, Trent Jaeger, Somesh Jha, Sanjit A. Seshia: Effective blame for information-flow violations. SIGSOFT FSE 2008: 250-260 |
| 4 | EE | Sandra Rueda, Dave King, Trent Jaeger: Verifying Compliance of Trusted Programs. USENIX Security Symposium 2008: 321-334 |
| 2007 | ||
| 3 | EE | Vinod Ganapathy, Dave King, Trent Jaeger, Somesh Jha: Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis. ICSE 2007: 458-467 |
| 2 | EE | Boniface Hicks, Dave King, Patrick McDaniel: Jifclipse: development tools for security-typed languages. PLAS 2007: 1-10 |
| 2006 | ||
| 1 | EE | Boniface Hicks, Dave King, Patrick McDaniel, Michael Hicks: Trusted declassification: : high-level policy for a security-typed language. PLAS 2006: 65-74 |
| 1 | Vinod Ganapathy | [3] |
| 2 | Boniface Hicks | [1] [2] [6] |
| 3 | Michael W. Hicks (Michael Hicks) | [1] [6] |
| 4 | Trent Jaeger | [3] [4] [5] [6] |
| 5 | Somesh Jha | [3] [5] |
| 6 | Patrick Drew McDaniel (Patrick McDaniel) | [1] [2] |
| 7 | Sandra Rueda | [4] |
| 8 | Sanjit A. Seshia | [5] |