Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparing transitive to non-transitive object immutability., , , , and . PLATEAU@SPLASH, page 47-48. ACM, (2015)Business Users and Program Variability: Bridging the Gap., , , , and . ICSR, volume 3107 of Lecture Notes in Computer Science, page 11-22. Springer, (2004)The Caernarvon secure embedded operating system., , , , and . ACM SIGOPS Oper. Syst. Rev., 42 (1): 32-39 (2008)Verifying the EROS Confinement Mechanism., and . S&P, page 166-176. IEEE Computer Society, (2000)The case for analysis preserving language transformation., , , , , , and . ISSTA, page 191-202. ACM, (2006)Software Development Practices, Barriers in the Field and the Relationship to Software Quality., , , , , , , , , and . ESEM, page 16:1-16:6. ACM, (2016)Empirical Evaluation of Secure Development Processes (Dagstuhl Seminar 23181)., , and . Dagstuhl Reports, 13 (5): 1-21 (2023)Exploring language support for immutability., , , , , and . ICSE, page 736-747. ACM, (2016)Empirical Studies on the Security and Usability Impact of Immutability., , , , and . SecDev, page 50-53. IEEE Computer Society, (2017)Chicken & Egg: Dependencies in Security Testing and Compliance with Common Criteria Evaluations., , , , , and . ISSSE, (2006)