Geoffrey Smith
Geoffrey Smith
School of Computing and Information Sciences, Florida International University
Geverifieerd e-mailadres voor cis.fiu.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
A sound type system for secure flow analysis
D Volpano, C Irvine, G Smith
Journal of computer security 4 (2-3), 167-187, 1996
12841996
Secure information flow in a multi-threaded imperative language
G Smith, D Volpano
Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of …, 1998
5641998
On the foundations of quantitative information flow
G Smith
International Conference on Foundations of Software Science and …, 2009
4972009
A type-based approach to program security
D Volpano, G Smith
Colloquium on Trees in Algebra and Programming, 607-621, 1997
3541997
Probabilistic noninterference in a concurrent language
D Volpano, G Smith
Journal of Computer Security 7 (2-3), 231-253, 1999
2351999
Probabilistic noninterference in a concurrent language
D Volpano, G Smith
Computer Security Foundations Workshop, 1998. Proceedings. 11th IEEE, 34-43, 1998
2351998
Measuring Information Leakage using Generalized Gain Functions
MS Alvim, K Chatzikokolakis, C Palamidessi, G Smith
2012 IEEE 25th Computer Security Foundations Symposium, 265-279, 2012
2032012
Eliminating covert flows with minimum typings
D Volpano, G Smith
Proceedings 10th Computer Security Foundations Workshop, 156-168, 1997
1911997
A New Type System for Secure Information Flow.
G Smith
CSFW 1, 4, 2001
1662001
Verifying secrets and relative secrecy
D Volpano, G Smith
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of …, 2000
1102000
Principles of secure information flow analysis
G Smith
Malware Detection, 291-307, 2007
982007
Principal type schemes for functional programs with overloading and subtyping
GS Smith
Science of Computer Programming 23 (2-3), 197-226, 1994
951994
Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks
B Köpf, G Smith
2010 23rd IEEE Computer Security Foundations Symposium, 44-56, 2010
912010
Probabilistic noninterference through weak probabilistic bisimulation
G Smith
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 3-13, 2003
742003
Quantifying information flow using min-entropy
G Smith
2011 Eighth International Conference on Quantitative Evaluation of SysTems …, 2011
692011
Additive and multiplicative notions of leakage, and their capacities
MS Alvim, K Chatzikokolakis, A McIver, C Morgan, C Palamidessi, ...
2014 IEEE 27th Computer Security Foundations Symposium, 308-322, 2014
652014
Abstract channels and their robust information-leakage ordering
A McIver, C Morgan, G Smith, B Espinoza, L Meinicke
International Conference on Principles of Security and Trust, 83-102, 2014
592014
Managing security policies in a distributed environment using eXtensible markup language (XML)
NN Vuong, GS Smith, Y Deng
Proceedings of the 2001 ACM symposium on Applied computing, 405-411, 2001
582001
Language issues in mobile program security
D Volpano, G Smith
Mobile Agents and Security, 25-43, 1998
571998
Polymorphic type inference for languages with overloading and subtyping
GS Smith
Cornell University, 1991
571991
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20