Boniface Hicks

According to our database1, Boniface Hicks authored at least 10 papers between 2006 and 2010.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
A logical specification and analysis for SELinux MLS policy.
ACM Trans. Inf. Syst. Secur., 2010

An architecture for enforcing end-to-end access control over web applications.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

2008
Noninvasive Methods for Host Certification.
ACM Trans. Inf. Syst. Secur., 2008

Implicit Flows: Can't Live with 'Em, Can't Live without 'Em.
Proceedings of the Information Systems Security, 4th International Conference, 2008

2007
From Trusted to Secure: Building and Executing Applications That Enforce System Security.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

Jifclipse: development tools for security-typed languages.
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007

Channels: Runtime System Infrastructure for Security-Typed Languages.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Non-Invasive Methods for Host Certification.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Trusted declassification: : high-level policy for a security-typed language.
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006

From Languages to Systems: Understanding Practical Application Development in Security-typed Languages.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006


  Loading...