Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Message Authentication through Non Interference., , and . AMAST, volume 1816 of Lecture Notes in Computer Science, page 258-272. Springer, (2000)Control Flow Analysis of Mobile Ambients with Security Boundaries., , and . FMOODS, volume 209 of IFIP Conference Proceedings, page 197-212. Kluwer, (2002)Nesting analysis of mobile ambients., , , , and . Comput. Lang. Syst. Struct., 30 (3-4): 207-230 (2004)Information flow security in Boundary Ambients., , and . Inf. Comput., 206 (2-4): 460-489 (2008)FWS: Analyzing, maintaining and transcompiling firewalls., , , , , , , and . J. Comput. Secur., 29 (1): 77-134 (2021)WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring., , , , , and . USENIX Security Symposium, page 1493-1510. USENIX Association, (2018)Techniques for Security Checking: Non-Interference vs Control Flow Analysis., , , , and . TOSCA, volume 62 of Electronic Notes in Theoretical Computer Science, page 211-228. Elsevier, (2001)Comparing Two Information Flow Security Properties.. CSFW, page 116-122. IEEE Computer Society, (1996)A Taxonomy of Security Properties for CCS., and . CSFW, page 126-136. IEEE Computer Society, (1994)CookiExt: Patching the browser against session hijacking attacks., , , and . J. Comput. Secur., 23 (4): 509-537 (2015)