J. G. Cederquist

Orcid: 0000-0003-2738-764X

According to our database1, J. G. Cederquist authored at least 18 papers between 1995 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
AtomiS: Data-Centric Synchronization Made Practical.
Proc. ACM Program. Lang., October, 2023

Sound Atomicity Inference for Data-Centric Synchronization.
CoRR, 2023

2019
Information flow in a distributed security setting.
CoRR, 2019

2014
Distributed Noninterference.
Proceedings of the 22nd Euromicro International Conference on Parallel, 2014

2013
Informative Types and Effects for Hybrid Migration Control.
Proceedings of the Runtime Verification - 4th International Conference, 2013

2011
Non-disclosure for distributed mobile code.
Math. Struct. Comput. Sci., 2011

Complexity of fairness constraints for the Dolev-Yao attacker model.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Risk Balance in Optimistic Non-repudiation Protocols.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

2007
Audit-based compliance control.
Int. J. Inf. Sec., 2007

Extended privilege inheritance in RBAC.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

A Certified Email Protocol Using Key Chains.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
An intruder model for verifying liveness in security protocols.
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, 2006

2005
An Audit Logic for Accountability.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

2004
Formal Analysis of a Fair Payment Protocol.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

A Machine-Checked Formalization of the Generic Model and the Random Oracle Model.
Proceedings of the Automated Reasoning - Second International Joint Conference, 2004

1996
An Implementation of the Heine-Borel Covering Theorem in Type Theory.
Proceedings of the Types for Proofs and Programs, 1996

1995
A Constructive Proof of the Heine-Borel Covering Theorem for Formal Reals.
Proceedings of the Types for Proofs and Programs, 1995


  Loading...