default search action
Andrew C. Myers
Person information
- affiliation: Cornell University, Department of Computer Science, Ithaca, NY, USA
- affiliation (PhD 1999): Massachusetts Institute of Technology (MIT), Cambridge, MA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c85]Cosku Acay, Joshua Gancher, Rolph Recto, Andrew C. Myers:
Secure Synthesis of Distributed Cryptographic Applications. CSF 2024: 433-448 - [i20]Cosku Acay, Joshua Gancher, Rolph Recto, Andrew C. Myers:
Secure Synthesis of Distributed Cryptographic Applications (Technical Report). CoRR abs/2401.04131 (2024) - [i19]Siqiu Yao, Haobin Ni, Andrew C. Myers, Ethan Cecchetti:
SCIF: A Language for Compositional Smart Contract Security. CoRR abs/2407.01204 (2024) - [i18]Vivian Ding, Cosku Acay, Andrew C. Myers:
An Array Intermediate Language for Mixed Cryptography. CoRR abs/2409.01587 (2024) - 2023
- [j25]Isaac C. Sheff, Xinwen Wang, Kushal Babel, Haobin Ni, Robbert van Renesse, Andrew C. Myers:
Charlotte: Reformulating Blockchains into a Web of Composable Attested Data Structures for Cross-Domain Applications. ACM Trans. Comput. Syst. 41: 2:1-2:52 (2023) - [c84]Drew Zagieboylo, Charles Sherk, Andrew C. Myers, G. Edward Suh:
SpecVerilog: Adapting Information Flow Control for Secure Speculation. CCS 2023: 2068-2082 - [i17]Rolph Recto, Andrew C. Myers:
A Compiler from Array Programs to Vectorized Homomorphic Encryption. CoRR abs/2311.06142 (2023) - 2022
- [j24]Elisavet Kozyri, Stephen Chong, Andrew C. Myers:
Expressing Information Flow Properties. Found. Trends Priv. Secur. 3(1): 1-102 (2022) - [c83]Mae Milano, Joshua Turcotti, Andrew C. Myers:
A flexible type system for fearless concurrency. PLDI 2022: 458-473 - [c82]Drew Zagieboylo, Charles Sherk, Gookwon Edward Suh, Andrew C. Myers:
PDL: a high-level hardware design language for pipelined processors. PLDI 2022: 719-732 - 2021
- [c81]Cosku Acay, Rolph Recto, Joshua Gancher, Andrew C. Myers, Elaine Shi:
Viaduct: an extensible, optimizing compiler for secure distributed programs. PLDI 2021: 740-755 - [c80]Ethan Cecchetti, Siqiu Yao, Haobin Ni, Andrew C. Myers:
Compositional Security for Reentrant Applications. SP 2021: 1249-1267 - [i16]Ethan Cecchetti, Siqiu Yao, Haobin Ni, Andrew C. Myers:
Compositional Security for Reentrant Applications. CoRR abs/2103.08577 (2021) - [i15]Owen Arden, Anitha Gollamudi, Ethan Cecchetti, Stephen Chong, Andrew C. Myers:
A Calculus for Flow-Limited Authorization. CoRR abs/2104.10379 (2021) - [i14]Cosku Acay, Rolph Recto, Joshua Gancher, Andrew C. Myers, Elaine Shi:
Viaduct: An Extensible, Optimizing Compiler for Secure Distributed Programs (Technical Report). IACR Cryptol. ePrint Arch. 2021: 468 (2021) - 2020
- [j23]Yizhou Zhang, Guido Salvaneschi, Andrew C. Myers:
Handling bidirectional control flow. Proc. ACM Program. Lang. 4(OOPSLA): 139:1-139:30 (2020) - [j22]Jacopo Banfi, Yizhou Zhang, G. Edward Suh, Andrew C. Myers, Mark E. Campbell:
Path Planning Under Malicious Injections and Removals of Perceived Obstacles: A Probabilistic Programming Approach. IEEE Robotics Autom. Lett. 5(4): 6884-6891 (2020) - [c79]Isaac C. Sheff, Xinwen Wang, Robbert van Renesse, Andrew C. Myers:
Heterogeneous Paxos. OPODIS 2020: 5:1-5:17 - [c78]Mulong Luo, Andrew C. Myers, G. Edward Suh:
Stealthy Tracking of Autonomous Vehicles with Cache Side Channels. USENIX Security Symposium 2020: 859-876 - [i13]Drew Zagieboylo, G. Edward Suh, Andrew C. Myers:
The Cost of Software-Based Memory Management Without Virtual Memory. CoRR abs/2009.06789 (2020) - [i12]Yizhou Zhang, Guido Salvaneschi, Andrew C. Myers:
Handling Bidirectional Control Flow: Technical Report. CoRR abs/2010.09073 (2020) - [i11]Isaac C. Sheff, Xinwen Wang, Robbert van Renesse, Andrew C. Myers:
Heterogeneous Paxos: Technical Report. CoRR abs/2011.08253 (2020)
2010 – 2019
- 2019
- [j21]Yizhou Zhang, Andrew C. Myers:
Abstraction-safe effect handlers via tunneling. Proc. ACM Program. Lang. 3(POPL): 5:1-5:29 (2019) - [j20]Andrew C. Myers:
Editorial. ACM Trans. Program. Lang. Syst. 41(2): 7:1 (2019) - [c77]Elisavet Kozyri, Owen Arden, Andrew C. Myers, Fred B. Schneider:
JRIF: Reactive Information Flow Control for Java. Foundations of Security, Protocols, and Equational Reasoning 2019: 70-88 - [c76]Drew Zagieboylo, G. Edward Suh, Andrew C. Myers:
Using Information Flow to Design an ISA that Controls Timing Channels. CSF 2019: 272-287 - [c75]Tom Magrino, Jed Liu, Nate Foster, Johannes Gehrke, Andrew C. Myers:
Efficient, Consistent Distributed Computation with Predictive Treaties. EuroSys 2019: 36:1-36:16 - [c74]Mae Milano, Rolph Recto, Tom Magrino, Andrew C. Myers:
A Tour of Gallifrey, a Language for Geodistributed Programming. SNAPL 2019: 11:1-11:19 - [i10]Isaac C. Sheff, Xinwen Wang, Haobin Ni, Robbert van Renesse, Andrew C. Myers:
Charlotte: Composable Authenticated Distributed Data Structures, Technical Report. CoRR abs/1905.03888 (2019) - 2018
- [c73]Jed Liu, Joe Corbett-Davies, Andrew Ferraiuolo, Alexander Ivanov, Mulong Luo, G. Edward Suh, Andrew C. Myers, Mark E. Campbell:
Secure Autonomous Cyber-Physical Systems Through Verifiable Information Flow Control. CPS-SPC@CCS 2018: 48-59 - [c72]Andrew Ferraiuolo, Mark Zhao, Andrew C. Myers, G. Edward Suh:
HyperFlow: A Processor Architecture for Nonmalleable, Timing-Safe Information Flow Security. CCS 2018: 1583-1600 - [c71]Mae Milano, Andrew C. Myers:
MixT: a language for mixing consistency in geodistributed transactions. PLDI 2018: 226-241 - [i9]Isaac C. Sheff, Xinwen Wang, Andrew C. Myers, Robbert van Renesse:
A Web of Blocks. CoRR abs/1806.06978 (2018) - 2017
- [j19]Jed Liu, Owen Arden, Michael D. George, Andrew C. Myers:
Fabric: Building open distributed systems securely by construction. J. Comput. Secur. 25(4-5): 367-426 (2017) - [j18]Yizhou Zhang, Andrew C. Myers:
Familia: unifying interfaces, type classes, and family polymorphism. Proc. ACM Program. Lang. 1(OOPSLA): 70:1-70:31 (2017) - [j17]Andrew C. Myers:
Foreword. ACM Trans. Program. Lang. Syst. 39(1): 1:1 (2017) - [j16]Danfeng Zhang, Andrew C. Myers, Dimitrios Vytiniotis, Simon L. Peyton Jones:
SHErrLoc: A Static Holistic Error Locator. ACM Trans. Program. Lang. Syst. 39(4): 18:1-18:47 (2017) - [c70]Andrew Ferraiuolo, Rui Xu, Danfeng Zhang, Andrew C. Myers, G. Edward Suh:
Verification of a Practical Hardware Security Architecture Through Static Information Flow Analysis. ASPLOS 2017: 555-568 - [c69]Ethan Cecchetti, Andrew C. Myers, Owen Arden:
Nonmalleable Information Flow Control. CCS 2017: 1875-1891 - [c68]Ian Arawjo, Cheng-Yao Wang, Andrew C. Myers, Erik Andersen, François Guimbretière:
Teaching Programming with Gamified Semantics. CHI 2017: 4911-4923 - [c67]Andrew Ferraiuolo, Weizhe Hua, Andrew C. Myers, G. Edward Suh:
Secure Information Flow Verification with Mutable Dependent Types. DAC 2017: 6:1-6:6 - [i8]Ethan Cecchetti, Andrew C. Myers, Owen Arden:
Nonmalleable Information Flow: Technical Report. CoRR abs/1708.08596 (2017) - 2016
- [c66]Isaac C. Sheff, Tom Magrino, Jed Liu, Andrew C. Myers, Robbert van Renesse:
Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency. CCS 2016: 229-241 - [c65]Owen Arden, Andrew C. Myers:
A Calculus for Flow-Limited Authorization. CSF 2016: 135-149 - [c64]Yao Wang, Andrew Ferraiuolo, Danfeng Zhang, Andrew C. Myers, G. Edward Suh:
SecDCP: secure dynamic cache partitioning for efficient timing channel protection. DAC 2016: 74:1-74:6 - [c63]Andrew Ferraiuolo, Yao Wang, Danfeng Zhang, Andrew C. Myers, G. Edward Suh:
Lattice priority scheduling: Low-overhead timing-channel protection for a shared memory controller. HPCA 2016: 382-393 - [c62]Yizhou Zhang, Guido Salvaneschi, Quinn Beightol, Barbara Liskov, Andrew C. Myers:
Accepting blame for safe tunneled exceptions. PLDI 2016: 281-295 - [e3]Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, Shai Halevi:
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016. ACM 2016, ISBN 978-1-4503-4139-4 [contents] - [i7]Stephen Chong, Joshua D. Guttman, Anupam Datta, Andrew C. Myers, Benjamin C. Pierce, Patrick Schaumont, Tim Sherwood, Nickolai Zeldovich:
Report on the NSF Workshop on Formal Methods for Security. CoRR abs/1608.00678 (2016) - [i6]Isaac C. Sheff, Tom Magrino, Jed Liu, Andrew C. Myers, Robbert van Renesse:
Safe Serializable Secure Scheduling: Transactions and the Trade-off Between Security and Consistency. CoRR abs/1608.04841 (2016) - 2015
- [c61]Danfeng Zhang, Yao Wang, G. Edward Suh, Andrew C. Myers:
A Hardware Design Language for Timing-Sensitive Information-Flow Security. ASPLOS 2015: 503-516 - [c60]Owen Arden, Jed Liu, Andrew C. Myers:
Flow-Limited Authorization. CSF 2015: 569-583 - [c59]Danfeng Zhang, Andrew C. Myers, Dimitrios Vytiniotis, Simon L. Peyton Jones:
Diagnosing type errors with class. PLDI 2015: 12-21 - [c58]Yizhou Zhang, Matthew C. Loring, Guido Salvaneschi, Barbara Liskov, Andrew C. Myers:
Lightweight, flexible object-oriented generics. PLDI 2015: 436-445 - [c57]Chinawat Isradisaikul, Andrew C. Myers:
Finding counterexamples from parsing conflicts. PLDI 2015: 555-564 - [e2]Riccardo Focardi, Andrew C. Myers:
Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings. Lecture Notes in Computer Science 9036, Springer 2015, ISBN 978-3-662-46665-0 [contents] - 2014
- [j15]Alvin Cheung, Samuel Madden, Armando Solar-Lezama, Owen Arden, Andrew C. Myers:
Using Program Analysis to Improve Database Applications. IEEE Data Eng. Bull. 37(1): 48-59 (2014) - [c56]Lantian Zheng, Andrew C. Myers:
A Language-Based Approach to Secure Quorum Replication. PLAS@ECOOP 2014: 27 - [c55]Jed Liu, Tom Magrino, Owen Arden, Michael D. George, Andrew C. Myers:
Warranties for Faster Strong Consistency. NSDI 2014: 503-517 - [c54]Danfeng Zhang, Andrew C. Myers:
Toward general diagnosis of static errors. POPL 2014: 569-582 - [c53]Jed Liu, Andrew C. Myers:
Defining and Enforcing Referential Security. POST 2014: 199-219 - [i5]Isaac C. Sheff, Robbert van Renesse, Andrew C. Myers:
Distributed Protocols and Heterogeneous Trust: Technical Report. CoRR abs/1412.3136 (2014) - 2013
- [c52]Alvin Cheung, Owen Arden, Samuel Madden, Armando Solar-Lezama, Andrew C. Myers:
StatusQuo: Making Familiar Abstractions Perform Using Program Analysis. CIDR 2013 - [c51]Chinawat Isradisaikul, Andrew C. Myers:
Reconciling exhaustive pattern matching with objects. PLDI 2013: 343-354 - [c50]Andrew C. Myers:
How languages can save distributed computing. POPL 2013: 315-316 - [c49]Alvin Cheung, Owen Arden, Samuel Madden, Andrew C. Myers:
Speeding up database applications with Pyxis. SIGMOD Conference 2013: 969-972 - 2012
- [j14]Andrew C. Myers, Michael Backes:
Preface. J. Comput. Secur. 20(6): 635-636 (2012) - [j13]Alvin Cheung, Owen Arden, Samuel Madden, Andrew C. Myers:
Automatic Partitioning of Database Applications. Proc. VLDB Endow. 5(11): 1471-1482 (2012) - [c48]Danfeng Zhang, Aslan Askarov, Andrew C. Myers:
Language-based control and mitigation of timing channels. PLDI 2012: 99-110 - [c47]Owen Arden, Michael D. George, Jed Liu, K. Vikram, Aslan Askarov, Andrew C. Myers:
Sharing Mobile Code Securely with Information Flow Control. IEEE Symposium on Security and Privacy 2012: 191-205 - [i4]Alvin Cheung, Owen Arden, Samuel Madden, Andrew C. Myers:
Automatic Partitioning of Database Applications. CoRR abs/1208.0271 (2012) - 2011
- [j12]Aslan Askarov, Andrew C. Myers:
Attacker Control and Impact for Confidentiality and Integrity. Log. Methods Comput. Sci. 7(3) (2011) - [c46]Danfeng Zhang, Aslan Askarov, Andrew C. Myers:
Predictive mitigation of timing channels in interactive systems. CCS 2011: 563-574 - 2010
- [c45]Aslan Askarov, Danfeng Zhang, Andrew C. Myers:
Predictive black-box mitigation of timing channels. CCS 2010: 297-307 - [c44]Aslan Askarov, Andrew C. Myers:
A Semantic Framework for Declassification and Endorsement. ESOP 2010: 64-84 - [c43]Andrew C. Myers:
Toward Securely Programming the Internet. ICISS 2010: 27 - [c42]Xin Qi, Andrew C. Myers:
Homogeneous family sharing. OOPSLA 2010: 520-538 - [p1]Andrew C. Myers:
Using Security Policies to Write Secure Software. Logics and Languages for Reliability and Security 2010: 225-261
2000 – 2009
- 2009
- [j11]Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, Xin Zheng:
Building secure web applications with automatic partitioning. Commun. ACM 52(2): 79-87 (2009) - [j10]Andrew C. Myers:
Technical perspective - Reframing security for the web. Commun. ACM 52(6): 82 (2009) - [j9]Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider:
Quantifying information flow with beliefs. J. Comput. Secur. 17(5): 655-701 (2009) - [c41]Xin Qi, Andrew C. Myers:
Sharing classes between families. PLDI 2009: 281-292 - [c40]Xin Qi, Andrew C. Myers:
Masked types for sound object initialization. POPL 2009: 53-65 - [c39]Jed Liu, Michael D. George, K. Vikram, Xin Qi, Lucas Waye, Andrew C. Myers:
Fabric: a platform for secure distributed computation and storage. SOSP 2009: 321-334 - 2008
- [j8]Alan Shieh, Andrew C. Myers, Emin Gün Sirer:
A stateless approach to connection-oriented protocols. ACM Trans. Comput. Syst. 26(3): 8:1-8:50 (2008) - [c38]Stephen Chong, Andrew C. Myers:
End-to-End Enforcement of Erasure and Declassification. CSF 2008: 98-111 - [c37]Andrew C. Myers:
Guiding Distributed Systems Synthesis with Language-Based Security Policies. FMOODS 2008: 1 - [c36]Lantian Zheng, Andrew C. Myers:
Securing nonintrusive web encryption through information flow. PLAS 2008: 125-134 - [c35]Michael R. Clarkson, Stephen Chong, Andrew C. Myers:
Civitas: Toward a Secure Voting System. SP 2008: 354-368 - 2007
- [j7]Lantian Zheng, Andrew C. Myers:
Dynamic security labels and static information flow control. Int. J. Inf. Sec. 6(2-3): 67-84 (2007) - [c34]Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, Xin Zheng:
Secure web application via automatic partitioning. SOSP 2007: 31-44 - [c33]Stephen Chong, K. Vikram, Andrew C. Myers:
SIF: Enforcing Confidentiality and Integrity in Web Applications. USENIX Security Symposium 2007 - [e1]Gilles Barthe, Heiko Mantel, Peter Müller, Andrew C. Myers, Andrei Sabelfeld:
Mobility, Ubiquity and Security, 25.02. - 02.03.2007. Dagstuhl Seminar Proceedings 07091, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 [contents] - [i3]Gilles Barthe, Heiko Mantel, Peter Müller, Andrew C. Myers, Andrei Sabelfeld:
07091 Executive Summary - Mobility, Ubiquity and Security. Mobility, Ubiquity and Security 2007 - [i2]Gilles Barthe, Heiko Mantel, Peter Müller, Andrew C. Myers, Andrei Sabelfeld:
07091 Abstracts Collection - Mobility, Ubiquity and Security. Mobility, Ubiquity and Security 2007 - [i1]Michael E. Clarkson, Stephen Chong, Andrew C. Myers:
Civitas: A Secure Remote Voting System. Frontiers of Electronic Voting 2007 - 2006
- [j6]Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic:
Enforcing Robust Declassification and Qualified Robustness. J. Comput. Secur. 14(2): 157-196 (2006) - [c32]Stephen Chong, Andrew C. Myers:
Decentralized Robustness. CSFW 2006: 242-256 - [c31]Nathaniel Nystrom, Xin Qi, Andrew C. Myers:
J&: nested intersection for scalable software composition. OOPSLA 2006: 21-36 - [c30]Jed Liu, Aaron Kimball, Andrew C. Myers:
Interruptible iterators. POPL 2006: 283-294 - 2005
- [c29]Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider:
Belief in Information Flow. CSFW 2005: 31-45 - [c28]Stephen Chong, Andrew C. Myers:
Language-Based Information Erasure. CSFW 2005: 241-254 - [c27]Lantian Zheng, Andrew C. Myers:
End-to-End Availability Policies and Noninterference. CSFW 2005: 272-286 - [c26]Andrew C. Myers:
Programming with Explicit Security Policies. ESOP 2005: 1-4 - [c25]Alan Shieh, Andrew C. Myers, Emin Gün Sirer:
Trickles: A Stateless Network Stack for Improved Scalability, Resilience, and Flexibility. NSDI 2005 - [c24]Andrew C. Myers:
Making distributed systems secure with program analysis and transformation. PASTE 2005: 47 - [c23]Chavdar Botev, Hubert Chao, Theodore Chao, Yim Cheng, Raymond Doyle, Sergey Grankin, Jon Guarino, Saikat Guha, Pei-Chen Lee, Dan Perry, Christopher Ré, Ilya Rifkin, Tingyan Yuan, Dora Abdullah, Kathy Carpenter, David Gries, Dexter Kozen, Andrew C. Myers, David I. Schwartz, Jayavel Shanmugasundaram:
Supporting workflow in a course management system. SIGCSE 2005: 262-266 - 2004
- [c22]Stephen Chong, Andrew C. Myers:
Security policies for downgrading. CCS 2004: 198-209 - [c21]Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic:
Enforcing Robust Declassification. CSFW 2004: 172-186 - [c20]Lantian Zheng, Andrew C. Myers:
Dynamic Security Labels and Noninterference (Extended Abstract). Formal Aspects in Security and Trust 2004: 27-40 - [c19]Nathaniel Nystrom, Stephen Chong, Andrew C. Myers:
Scalable extensibility via nested inheritance. OOPSLA 2004: 99-115 - 2003
- [j5]Andrei Sabelfeld, Andrew C. Myers:
Language-based information-flow security. IEEE J. Sel. Areas Commun. 21(1): 5-19 (2003) - [c18]Nathaniel Nystrom, Michael R. Clarkson, Andrew C. Myers:
Polyglot: An Extensible Compiler Framework for Java. CC 2003: 138-152 - [c17]Steve Zdancewic, Andrew C. Myers:
Observational Determinism for Concurrent Program Security. CSFW 2003: 29- - [c16]Andrei Sabelfeld, Andrew C. Myers:
A Model for Delimited Information Release. ISSS 2003: 174-191 - [c15]Jed Liu, Andrew C. Myers:
JMatch: Iterable Abstract Pattern Matching for Java. PADL 2003: 110-127 - [c14]Lantian Zheng, Stephen Chong, Andrew C. Myers, Steve Zdancewic:
Using Replication and Partitioning to Build Secure Distributed Systems. S&P 2003: 236-250 - 2002
- [j4]Steve Zdancewic, Andrew C. Myers:
Secure Information Flow via Linear Continuations. High. Order Symb. Comput. 15(2-3): 209-234 (2002) - [j3]Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers:
Secure program partitioning. ACM Trans. Comput. Syst. 20(3): 283-328 (2002) - 2001
- [c13]Steve Zdancewic, Andrew C. Myers:
Robust Declassification. CSFW 2001: 15-23 - [c12]Steve Zdancewic, Andrew C. Myers:
Secure Information Flow and CPS. ESOP 2001: 46-61 - [c11]Andrew C. Myers:
Security-Typed Languages and Distributed Computation. SAS 2001: 437-438 - [c10]Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers:
Untrusted Hosts and Confidentiality: Secure Program Partitioning. SOSP 2001: 1-14 - 2000
- [j2]Andrew C. Myers, Barbara Liskov:
Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol. 9(4): 410-442 (2000)
1990 – 1999
- 1999
- [b1]Andrew C. Myers:
Mostly-static decentralized information flow control. Massachusetts Institute of Technology, Cambridge, MA, USA, 1999 - [c9]Andrew C. Myers:
JFlow: Practical Mostly-Static Information Flow Control. POPL 1999: 228-241 - 1998
- [c8]Andrew C. Myers, Barbara Liskov:
Complete, Safe Information Flow with Decentralized Labels. S&P 1998: 186-197 - 1997
- [c7]Andrew C. Myers, Joseph A. Bank, Barbara Liskov:
Parameterized Types for Java. POPL 1997: 132-145 - [c6]Miguel Castro, Atul Adya, Barbara Liskov, Andrew C. Myers:
HAC: Hybrid Adaptive Caching for Distributed Storage Systems. SOSP 1997: 102-115 - [c5]Andrew C. Myers, Barbara Liskov:
A Decentralized Model for Information Flow Control. SOSP 1997: 129-142 - 1996
- [c4]Barbara Liskov, Atul Adya, Miguel Castro, Mark Day, Sanjay Ghemawat, Robert Gruber, Umesh Maheshwari, Andrew C. Myers, Liuba Shrira:
Safe and Efficient Sharing of Persistent Objects in Thor. SIGMOD Conference 1996: 318-329 - 1995
- [c3]Andrew C. Myers:
Bidirectional Object Layout for Separate Compilation. OOPSLA 1995: 124-139 - [c2]Mark Day, Robert Gruber, Barbara Liskov, Andrew C. Myers:
Subtypes vs. Where Clauses: Constraining Parametric Polymorphism. OOPSLA 1995: 156-168 - 1993
- [j1]Mark Day, Barbara Liskov, Umesh Maheshwari, Andrew C. Myers:
References to Remote Mobile Objects in Thor. LOPLAS 2(1-4): 115-126 (1993) - [c1]Andrew C. Myers:
Resolving the Integrity/Performance Conflict. Workshop on Workstation Operating Systems 1993: 156-159
Coauthor Index
aka: Gookwon Edward Suh
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 02:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint