Dave King

Affiliations:
  • Penn State, PA, USA


According to our database1, Dave King authored at least 8 papers between 2006 and 2010.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2010
An architecture for enforcing end-to-end access control over web applications.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Automating Security Mediation Placement.
Proceedings of the Programming Languages and Systems, 2010

2008
Verifying Compliance of Trusted Programs.
Proceedings of the 17th USENIX Security Symposium, 2008

Effective blame for information-flow violations.
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008

Implicit Flows: Can't Live with 'Em, Can't Live without 'Em.
Proceedings of the Information Systems Security, 4th International Conference, 2008

2007
Jifclipse: development tools for security-typed languages.
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007

Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

2006
Trusted declassification: : high-level policy for a security-typed language.
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006


  Loading...