Follow
David A. Naumann
David A. Naumann
Professor of Computer Science, Stevens Institute of Technology
Verified email at cs.stevens.edu - Homepage
Title
Cited by
Cited by
Year
Secure Information Flow and Pointer Confinement in a Java-like Language.
A Banerjee, DA Naumann
CSFW 2, 253, 2002
2592002
Stack-based access control and secure information flow
A Banerjee, DA Naumann
Journal of functional programming 15 (2), 131-177, 2005
2112005
Expressive declassification policies and modular static enforcement
A Banerjee, DA Naumann, S Rosenberg
2008 IEEE Symposium on Security and Privacy (sp 2008), 339-353, 2008
1572008
Friends need a bit more: Maintaining invariants over shared state
M Barnett, DA Naumann
International Conference on Mathematics of Program Construction, 54-84, 2004
1522004
Regional logic for local reasoning about global invariants
A Banerjee, DA Naumann, S Rosenberg
ECOOP 2008–Object-Oriented Programming: 22nd European Conference Paphos …, 2008
1492008
Representation independence, confinement and access control
A Banerjee, DA Naumann
Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of …, 2002
1422002
Ownership confinement ensures representation independence for object-oriented programs
A Banerjee, DA Naumann
Journal of the ACM (JACM) 52 (6), 894-960, 2005
1302005
Information flow monitor inlining
A Chudnov, DA Naumann
2010 23rd IEEE Computer Security Foundations Symposium, 200-214, 2010
1012010
Deriving an information flow checker and certifying compiler for java
G Barthe, D Naumann, T Rezk
2006 IEEE Symposium on Security and Privacy (S&P'06), 13 pp.-242, 2006
862006
From coupling relations to mated invariants for checking information flow
DA Naumann
Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006
812006
History-based access control and secure information flow
A Banerjee, DA Naumann
International Workshop on Construction and Analysis of Safe, Secure, and …, 2004
772004
Beyond stack inspection: A unified access-control and information-flow security model
M Pistoia, A Banerjee, DA Naumann
2007 IEEE Symposium on Security and Privacy (SP'07), 149-163, 2007
742007
Inlined information flow monitoring for JavaScript
A Chudnov, DA Naumann
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
732015
99.44% pure: Useful abstractions in specifications
M Barnett, DA Naumann, W Schulte, Q Sun
ECOOP workshop on formal techniques for Java-like programs (FTfJP), 2004
732004
A weakest precondition semantics for an object-oriented language of refinement
A Cavalcanti, DA Naumann
FM’99—Formal Methods: World Congress on Formal Methods in the Development …, 1999
711999
A weakest precondition semantics for refinement of object-oriented programs
A Cavalcanti, DA Naumann
IEEE Transactions on Software Engineering 26 (8), 713-728, 2000
702000
Behavioral subtyping, specification inheritance, and modular reasoning
GT Leavens, DA Naumann
ACM Transactions on Programming Languages and Systems (TOPLAS) 37 (4), 1-88, 2015
662015
Using access control for secure information flow in a Java-like language
A Banerjee, DA Naumann
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 155-169, 2003
662003
Guiding a general-purpose C verifier to prove cryptographic protocols
F Dupressoir, AD Gordon, J Jürjens, DA Naumann
Journal of Computer Security 22 (5), 823-866, 2014
652014
Towards imperative modules: Reasoning about invariants and sharing of mutable state
DA Naumann, M Barnett
Theoretical Computer Science 365 (1-2), 143-168, 2006
652006
The system can't perform the operation now. Try again later.
Articles 1–20