Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Invisinets: Removing Networking from Cloud Networks., , , , , , , , and . NSDI, page 479-496. USENIX Association, (2023)Automatic error finding in access-control policies., , , , and . CCS, page 163-174. ACM, (2011)Checking Beliefs in Dynamic Networks, , , , and . MSR-TR-2014-58. (April 2014)Position paper: why are there so many vulnerabilities in web applications?, , , , and . NSPW, page 83-94. ACM, (2011)Credentials Management for High-Value Transactions., , , , and . MMM-ACNS, volume 6258 of Lecture Notes in Computer Science, page 169-182. Springer, (2010)Enforcing Request Integrity in Web Applications., , , and . DBSec, volume 6166 of Lecture Notes in Computer Science, page 225-240. Springer, (2010)Test coverage metrics for the network., , , , and . SIGCOMM, page 775-787. ACM, (2021)Lightyear: Using Modularity to Scale BGP Control Plane Verification., , , , , , and . SIGCOMM, page 94-107. ACM, (2023)Validating datacenters at scale., , , , , , , , , and 7 other author(s). SIGCOMM, page 200-213. ACM, (2019)Checking Beliefs in Dynamic Networks., , , , and . NSDI, page 499-512. USENIX Association, (2015)