Penn State
List of publications from the DBLP Bibliography Server - FAQother persons with the same name:
2008 | ||
---|---|---|
6 | EE | Dave King, Boniface Hicks, Michael Hicks, Trent Jaeger: Implicit Flows: Can't Live with 'Em, Can't Live without 'Em. ICISS 2008: 56-70 |
5 | EE | Dave King, Trent Jaeger, Somesh Jha, Sanjit A. Seshia: Effective blame for information-flow violations. SIGSOFT FSE 2008: 250-260 |
4 | EE | Sandra Rueda, Dave King, Trent Jaeger: Verifying Compliance of Trusted Programs. USENIX Security Symposium 2008: 321-334 |
2007 | ||
3 | EE | Vinod Ganapathy, Dave King, Trent Jaeger, Somesh Jha: Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis. ICSE 2007: 458-467 |
2 | EE | Boniface Hicks, Dave King, Patrick McDaniel: Jifclipse: development tools for security-typed languages. PLAS 2007: 1-10 |
2006 | ||
1 | EE | Boniface Hicks, Dave King, Patrick McDaniel, Michael Hicks: Trusted declassification: : high-level policy for a security-typed language. PLAS 2006: 65-74 |
1 | Vinod Ganapathy | [3] |
2 | Boniface Hicks | [1] [2] [6] |
3 | Michael W. Hicks (Michael Hicks) | [1] [6] |
4 | Trent Jaeger | [3] [4] [5] [6] |
5 | Somesh Jha | [3] [5] |
6 | Patrick Drew McDaniel (Patrick McDaniel) | [1] [2] |
7 | Sandra Rueda | [4] |
8 | Sanjit A. Seshia | [5] |