Author of the publication

A taint marking approach to confidentiality violation detection.

, , , and . AISC, volume 125 of CRPIT, page 83-90. Australian Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preface of the 2nd Workshop on the Security of Software/Hardware Interfaces (SILM 2020)., , and . EuroS&P Workshops, page 681. IEEE, (2020)DAMAS: Control-Data Isolation at Runtime through Dynamic Binary Modification., , , and . EuroS&P Workshops, page 86-95. IEEE, (2021)From Binary Consensus to Multivalued Consensus in asynchronous message-passing systems, , and . Information Processing Letters, 73 (5-6): 207 - 212 (2000)A taint marking approach to confidentiality violation detection., , , and . AISC, volume 125 of CRPIT, page 83-90. Australian Computer Society, (2012)Program Transformation for Non-interference Verification on Programs with Pointers., , , and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 231-244. Springer, (2013)A Secure Two-Phase Data Deduplication Scheme., , , and . HPCC/CSS/ICESS, page 802-809. IEEE, (2014)Information Flow Control for Intrusion Detection Derived from MAC Policy., , , and . ICC, page 1-6. IEEE, (2011)Hypercollecting semantics and its application to static analysis of information flow., , , , and . POPL, page 874-887. ACM, (2017)On Classes of Problems in Asynchronous Distributed Systems with Process Crashes., , and . ICDCS, page 470-477. IEEE Computer Society, (1999)Mistore: A distributed storage system leveraging the DSL infrastructure of an ISP., , , and . HPCS, page 260-267. IEEE, (2014)