Owen Arden

According to our database1, Owen Arden authored at least 28 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Proximal Byzantine Consensus.
CoRR, 2024

2023
Flow-limited authorization for consensus, replication, and secret sharing.
J. Comput. Secur., 2023

Unstick Yourself: Recoverable Byzantine Fault Tolerant Services.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

2022
Payment Channels Under Network Congestion.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

Applying consensus and replication securely with FLAQR.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

2021
A Calculus for Flow-Limited Authorization.
CoRR, 2021

AttkFinder: Discovering Attack Vectors in PLC Programs using Information Flow Analysis.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Total Eclipse of the Enclave: Detecting Eclipse Attacks From Inside TEEs.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Secure Distributed Applications the Decent Way.
Proceedings of the ASSS '21: Proceedings of the 2021 International Symposium on Advanced Security on Software and Systems, 2021

2020
Building secure distributed applications the DECENT way.
CoRR, 2020

First-Order Logic for Flow-Limited Authorization.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

AnyLog: a Grand Unification of the Internet of Things.
Proceedings of the 10th Conference on Innovative Data Systems Research, 2020

2019
Information Flow Control for Distributed Trusted Execution Environments.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

Vote Them Out: Detecting and Eliminating Byzantine Peers.
Proceedings of the ACM Symposium on Cloud Computing, SoCC 2019, 2019

JRIF: Reactive Information Flow Control for Java.
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019

2017
Flow-Limited Authorization.
PhD thesis, 2017

Fabric: Building open distributed systems securely by construction.
J. Comput. Secur., 2017

Nonmalleable Information Flow: Technical Report.
CoRR, 2017

Cryptographically Secure Information Flow Control on Key-Value Stores.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Nonmalleable Information Flow Control.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
A Calculus for Flow-Limited Authorization.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

2015
Flow-Limited Authorization.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
Using Program Analysis to Improve Database Applications.
IEEE Data Eng. Bull., 2014

Warranties for Faster Strong Consistency.
Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, 2014

2013
Speeding up database applications with Pyxis.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2013

StatusQuo: Making Familiar Abstractions Perform Using Program Analysis.
Proceedings of the Sixth Biennial Conference on Innovative Data Systems Research, 2013

2012
Automatic Partitioning of Database Applications.
Proc. VLDB Endow., 2012

Sharing Mobile Code Securely with Information Flow Control.
Proceedings of the IEEE Symposium on Security and Privacy, 2012


  Loading...