Andrew C. Myers
Andrew C. Myers
Professor of Computer Science, Cornell University
Verified email at - Homepage
Cited by
Cited by
Language-based information-flow security
A Sabelfeld, AC Myers
Selected Areas in Communications, IEEE Journal on 21 (1), 5-19, 2003
JFlow: Practical mostly-static information flow control
AC Myers
ACM Symposium on Principles of Programming Languages (POPL), 228-241, 1999
Protecting privacy using the decentralized label model
AC Myers, B Liskov
ACM Transactions on Software Engineering and Methodology (TOSEM) 9 (4), 410-442, 2000
A decentralized model for information flow control
AC Myers, B Liskov
ACM Symposium on Operating Systems Principles (SOSP) 31 (5), 129-142, 1997
Polyglot: An extensible compiler framework for Java
N Nystrom, M Clarkson, AC Myers
Compiler Construction, 138-152, 2003
Civitas: Toward a secure voting system
MR Clarkson, S Chong, AC Myers
IEEE Symposium on Security and Privacy, 354-368, 2008
Parameterized types for Java
AC Myers, JA Bank, B Liskov
ACM Symposium on Principles of Programming Languages (POPL), 132-145, 1997
Secure web applications via automatic partitioning
S Chong, J Liu, AC Myers, X Qi, K Vikram, L Zheng, X Zheng
ACM Symposium on Operating Systems Principles (SOSP) 41 (6), 31-44, 2007
Jif: Java information flow
AC Myers, L Zheng, S Zdancewic, S Chong, N Nystrom
Software release. Located at, 2001
Robust declassification
S Zdancewic, AC Myers
Computer Security Foundations Workshop, 15-23, 2001
Observational determinism for concurrent program security
S Zdancewic, AC Myers
16th IEEE Computer Security Foundations Workshop, 29-43, 2003
A model for delimited information release
A Sabelfeld, AC Myers
International Symposium on Software Security, 174-191, 2003
Complete, safe information flow with decentralized labels
AC Myers, B Liskov
Security and Privacy, Proceedings 1998 IEEE Symposium on, 186-197, 1998
SIF: Enforcing confidentiality and integrity in web applications
S Chong, K Vikram, AC Myers
16th USENIX Security Symposium, 1-16, 2007
Safe and efficient sharing of persistent objects in Thor
B Liskov, A Adya, M Castro, M Day, S Ghemawat, R Gruber, ...
ACM SIGMOD Record 25 (2), 318-329, 1996
Predictive black-box mitigation of timing channels
A Askarov, D Zhang, AC Myers
17th ACM Conference on Computer and Communications Security (CCS), 297-307, 2010
Secure program partitioning
S Zdancewic, L Zheng, N Nystrom, AC Myers
ACM Transactions on Computer Systems (TOCS) 20 (3), 283-328, 2002
Security policies for downgrading
S Chong, AC Myers
11th ACM Conference on Computer and Communications Security, 198-209, 2004
Scalable extensibility via nested inheritance
N Nystrom, S Chong, AC Myers
OOPSLA'04, 99-115, 2004
Fabric: A platform for secure distributed computation and storage
J Liu, MD George, K Vikram, X Qi, L Waye, AC Myers
22nd ACM Symposium on Operating Systems Principles (SOSP), 321-334, 2009
The system can't perform the operation now. Try again later.
Articles 1–20