Scott D. Stoller

According to our database1, Scott D. Stoller authored at least 151 papers between 1994 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies.
CoRR, 2019

Neural Flocking: MPC-based Supervised Learning of Flocking Controllers.
CoRR, 2019

Neural Simplex Architecture.
CoRR, 2019

Algorithm Diversity for Resilient Systems.
CoRR, 2019

Efficient and Extensible Policy Mining for Relationship-Based Access Control.
CoRR, 2019

Greedy and evolutionary algorithms for mining relationship-based access control policies.
Computers & Security, 2019

Efficient and Extensible Policy Mining for Relationship-Based Access Control.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Neural Predictive Monitoring.
Proceedings of the Runtime Verification - 19th International Conference, 2019

Moderately Complex Paxos Made Simple: High-Level Executable Specification of Distributed Algorithms.
Proceedings of the 21st International Symposium on Principles and Practice of Programming Languages, 2019

From Classical to Blockchain Consensus: What Are the Exact Algorithms?
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, 2019

Algorithm Diversity for Resilient Systems.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

Conformal Predictions for Hybrid System State Classification.
Proceedings of the From Reactive Systems to Cyber-Physical Systems, 2019

2018
Mining hierarchical temporal roles with multiple metrics.
Journal of Computer Security, 2018

Neural State Classification for Hybrid Systems.
CoRR, 2018

SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data.
CoRR, 2018

Dependence-Preserving Data Compaction for Scalable Forensic Analysis.
Proceedings of the 27th USENIX Security Symposium, 2018

Declarative vs rule-based control for flocking dynamics.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Founded Semantics and Constraint Semantics of Logic Rules.
Proceedings of the Logical Foundations of Computer Science - International Symposium, 2018

Mining Relationship-Based Access Control Policies from Incomplete and Noisy Data.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

Neural State Classification for Hybrid Systems.
Proceedings of the Automated Technology for Verification and Analysis, 2018

2017
From Clarity to Efficiency for Distributed Algorithms.
ACM Trans. Program. Lang. Syst., 2017

Collision avoidance for mobile robots with limited sensing and limited information about moving obstacles.
Formal Methods in System Design, 2017

How to Learn a Model Checker.
CoRR, 2017

Declarative vs Rule-based Control for Flocking Dynamics.
CoRR, 2017

Mining Relationship-Based Access Control Policies.
CoRR, 2017

A Component-Based Simplex Architecture for High-Assurance Cyber-Physical Systems.
CoRR, 2017

Model Checking Cyber-Physical Systems using Particle Swarm Optimization.
CoRR, 2017

Moderately Complex Paxos Made Simple: High-Level Specification of Distributed Algorithm.
CoRR, 2017

SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data.
Proceedings of the 26th USENIX Security Symposium, 2017

A Simplex Architecture for Hybrid Systems Using Barrier Certificates.
Proceedings of the Computer Safety, Reliability, and Security, 2017

Mining Relationship-Based Access Control Policies.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Fast Distributed Evaluation of Stateful Attribute-Based Access Control Policies.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

A Component-Based Simplex Architecture for High-Assurance Cyber-Physical Systems.
Proceedings of the 17th International Conference on Application of Concurrency to System Design, 2017

2016
Mining Hierarchical Temporal Roles with Multiple Metrics.
CoRR, 2016

The Founded Semantics and Constraint Semantics of Logic Rules.
CoRR, 2016

Attack Analysis Results for Adversarial Engagement 1 of the DARPA Transparent Computing Program.
CoRR, 2016

Formal Verification of Multi-Paxos for Distributed Consensus.
CoRR, 2016

Demand-driven incremental object queries.
Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming, 2016

Formal Verification of Multi-Paxos for Distributed Consensus.
Proceedings of the FM 2016: Formal Methods, 2016

Mining Hierarchical Temporal Roles with Multiple Metrics.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

2015
Mining Attribute-Based Access Control Policies.
IEEE Trans. Dependable Sec. Comput., 2015

Policy analysis for administrative role based access control without separate administration.
Journal of Computer Security, 2015

A survey on unmanned aerial vehicle collision avoidance systems.
CoRR, 2015

Demand-Driven Incremental Object Queries.
CoRR, 2015

Collision Avoidance for Mobile Robots with Limited Sensing and Limited Information About the Environment.
Proceedings of the Runtime Verification - 6th International Conference, 2015

An Administrative Model for Relationship-Based Access Control.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

2014
Abductive Analysis of Administrative Policies in Rule-Based Access Control.
IEEE Trans. Dependable Sec. Comput., 2014

Mining Attribute-Based Access Control Policies from Logs.
CoRR, 2014

From Clarity to Efficiency for Distributed Algorithms.
CoRR, 2014

Using Statistical Model Checking for Measuring Systems.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications, 2014

Compositional Branching-Time Measurements.
Proceedings of the From Programs to Systems. The Systems perspective in Computing, 2014

Stochastic Game-Based Analysis of the DNS Bandwidth Amplification Attack Using Probabilistic Model Checking.
Proceedings of the 2014 Tenth European Dependable Computing Conference, 2014

Mining Attribute-Based Access Control Policies from Logs.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
Mining Attribute-based Access Control Policies.
CoRR, 2013

Runtime Verification with Particle Filtering.
Proceedings of the Runtime Verification - 4th International Conference, 2013

Mining parameterized role-based policies.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Software monitoring with controllable overhead.
STTT, 2012

InterAspect: aspect-oriented instrumentation with GCC.
Formal Methods in System Design, 2012

High-Level Executable Specifications of Distributed Algorithms.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012

Algorithms for mining meaningful roles.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Adaptive Runtime Verification.
Proceedings of the Runtime Verification, Third International Conference, 2012

Composing transformations for instrumentation and optimization.
Proceedings of the ACM SIGPLAN 2012 Workshop on Partial Evaluation and Program Manipulation, 2012

From clarity to efficiency for distributed algorithms.
Proceedings of the 27th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2012

2011
Trust Management in Databases.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Policy analysis for Administrative Role-Based Access Control.
Theor. Comput. Sci., 2011

Symbolic reachability analysis for parameterized administrative role-based access control.
Computers & Security, 2011

On the energy consumption and performance of systems software.
Proceedings of of SYSTOR 2011: The 4th Annual Haifa Experimental Systems Conference, Haifa, Israel, May 30, 2011

Runtime Verification with State Estimation.
Proceedings of the Runtime Verification - Second International Conference, 2011

Abductive Analysis of Administrative Policies in Rule-Based Access Control.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Redflag: A Framework for Analysis of Kernel-Level Concurrency.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

Model discovery for energy-aware computing systems: An experimental evaluation.
Proceedings of the 2011 International Green Computing Conference and Workshops, 2011

2010
Detection of deadlock potentials in multithreaded programs.
IBM Journal of Research and Development, 2010

Aspect-Oriented Instrumentation with GCC.
Proceedings of the Runtime Verification - First International Conference, 2010

Alias analysis for optimization of dynamic languages.
Proceedings of the 6th Symposium on Dynamic Languages, 2010

Trust management for Web Services.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
From datalog rules to efficient programs with time and space guarantees.
ACM Trans. Program. Lang. Syst., 2009

RBAC-PAT: A Policy Analysis Tool for Role Based Access Control.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2009

Verification of Security Policy Enforcement in Enterprise Systems.
Proceedings of the Emerging Challenges for Security, 2009

Symbolic reachability analysis for parameterized administrative role based access control.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Parametric heap usage analysis for functional programs.
Proceedings of the 8th International Symposium on Memory Management, 2009

A language and framework for invariant-driven transformations.
Proceedings of the Generative Programming and Component Engineering, 2009

HAVE: Detecting Atomicity Violations via Integrated Dynamic and Static Analysis.
Proceedings of the Fundamental Approaches to Software Engineering, 2009

2008
Trust Management and Trust Negotiation in an Extension of SQL.
Proceedings of the Trustworthy Global Computing, 4th International Symposium, 2008

Analysis and Transformations for Efficient Query-Based Debugging.
Proceedings of the Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 2008

6th workshop on parallel and distributed systems: testing and debugging (PADTAD '08).
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2008

Efficient runtime invariant checking: a framework and case study.
Proceedings of the 2008 International Workshop on Dynamic Analysis: held in conjunction with the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2008), 2008

Software monitoring with bounded overhead.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

2007
Towards a framework and a benchmark for testing tools for multi-threaded programs.
Concurrency and Computation: Practice and Experience, 2007

Efficient policy analysis for administrative role based access control.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Security policy analysis using deductive spreadsheets.
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, 2007

2006
Runtime Analysis of Atomicity for Multithreaded Programs.
IEEE Trans. Software Eng., 2006

Optimistic synchronization-based state-space reduction.
Formal Methods in System Design, 2006

Preface.
Electr. Notes Theor. Comput. Sci., 2006

Accurate and efficient runtime detection of atomicity errors in concurrent programs.
Proceedings of the ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2006

Efficient type inference for secure information flow.
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006

Querying Complex Graphs.
Proceedings of the Practical Aspects of Declarative Languages, 8th International Symposium, 2006

Run-time detection of potential deadlocks for programs with locks, semaphores, and condition variables.
Proceedings of the 4th Workshop on Parallel and Distributed Systems: Testing, 2006

Policy Analysis for Administrative Role Based Access Control.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

2005
Optimizing aggregate array computations in loops.
ACM Trans. Program. Lang. Syst., 2005

Foreword.
Formal Methods in System Design, 2005

Automated Analysis of Fault-Tolerance in Distributed Systems.
Formal Methods in System Design, 2005

Static analysis of atomicity for programs with non-blocking synchronization.
Proceedings of the ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2005

Automated type-based analysis of data races and atomicity.
Proceedings of the ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2005

Incrementalization across object abstraction.
Proceedings of the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2005

Implementing incrementalization across object abstraction.
Proceedings of the Companion to the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2005

Optimized run-time race detection and atomicity checking using partial discovered types.
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), 2005

Detecting Potential Deadlocks with Static Analysis and Run-Time Monitoring.
Proceedings of the Hardware and Software Verification and Testing, 2005

2004
Type Inference for Parameterized Race-Free Java.
Proceedings of the Verification, 2004

Parametric regular path queries.
Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation 2004, 2004

2003
Eliminating dead code on recursive data.
Sci. Comput. Program., 2003

Dynamic Programming via Static Incrementalization.
Higher-Order and Symbolic Computation, 2003

Run-Time Analysis for Atomicity.
Electr. Notes Theor. Comput. Sci., 2003

SoftMC 2003: Workshop on Software Model Checking.
Electr. Notes Theor. Comput. Sci., 2003

Optimized Live Heap Bound Analysis.
Proceedings of the Verification, 2003

Optimistic Synchronization-Based State-Space Reduction.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2003

From datalog rules to efficient programs with time and space guarantees.
Proceedings of the 5th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2003

Optimizing Ackermann's function by incrementalization.
Proceedings of the 2003 ACM SIGPLAN Workshop on Partial Evaluation and Semantics-based Program Manipulation, 2003

Benchmark and Framework for Encouraging Research on Multi-Threaded Testing Tools .
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

2002
Model-checking multi-threaded distributed Java programs.
STTT, 2002

Testing Concurrent Java Programs using Randomized Scheduling.
Electr. Notes Theor. Comput. Sci., 2002

Program optimization using indexed and recursive data structures.
Proceedings of the 2002 ACM SIGPLAN Workshop on Partial Evaluation and Semantics-Based Program Manipulation (PEPM '02), 2002

Domain partitioning for open reactive systems.
Proceedings of the International Symposium on Software Testing and Analysis, 2002

A Bound on Attacks on Authentication Protocols.
Proceedings of the Foundations of Information Technology in the Era of Networking and Mobile Computing, 2002

2001
Strengthening invariants for efficient computation.
Sci. Comput. Program., 2001

Preface.
Electr. Notes Theor. Comput. Sci., 2001

Transformations for Model Checking Distributed Java Programs.
Proceedings of the Model Checking Software, 2001

Solving Regular Tree Grammar Based Constraints.
Proceedings of the Static Analysis, 8th International Symposium, 2001

A Bound on Attacks on Payment Protocols.
Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science, 2001

Automatic Accurate Live Memory Analysis for Garbage-Collected Languages.
Proceedings of The Workshop on Languages, 2001

Automated Software Engineering Using Concurrent Class Machines.
Proceedings of the 16th IEEE International Conference on Automated Software Engineering (ASE 2001), 2001

2000
Leader Election in Asynchronous Distributed Systems.
IEEE Trans. Computers, 2000

Detecting Global Predicates in Distributed Systems with Clocks.
Distributed Computing, 2000

Model-Checking Multi-threaded Distributed Java Programs.
Proceedings of the SPIN Model Checking and Software Verification, 7th International SPIN Workshop, Stanford, CA, USA, August 30, 2000

From Recursion to Iteration: What are the Optimizations?
Proceedings of the 2000 ACM SIGPLAN Workshop on Partial Evaluation and Semantics-Based Program Manipulation (PEPM '00), 2000

Efficient Detection of Global Properties in Distributed Systems Using Partial-Order Methods.
Proceedings of the Computer Aided Verification, 12th International Conference, 2000

1999
ETAPS '99 - Conference Report.
SIGPLAN Notices, 1999

Eliminating Dead Code on Recursive Data.
Proceedings of the Static Analysis, 6th International Symposium, 1999

Lower and Upper Bounds for Attacks on Authentication Protocols.
Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing, 1999

Dynamic Programming via Static Incrementalization.
Proceedings of the Programming Languages and Systems, 1999

1998
Static Caching for Incremental Computation.
ACM Trans. Program. Lang. Syst., 1998

Loop Optimization for Aggregate Array Computations.
Proceedings of the 1998 International Conference on Computer Languages, 1998

Automated Stream-Based Analysis of Fault-Tolerance.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 1998

Efficient Symbolic Detection of Global Properties in Distributed Systems.
Proceedings of the Computer Aided Verification, 10th International Conference, 1998

1997
Detecting Global Predicates in Distributed Systems with Clocks.
Proceedings of the Distributed Algorithms, 11th International Workshop, 1997

1996
Cryptographic support for fault-tolerant distributed computing.
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996

Discovering Auxiliary Information for Incremental Computation.
Proceedings of the Conference Record of POPL'96: The 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1996

1995
Verifying Programs That Use Causally-Ordered Message-Passing.
Sci. Comput. Program., 1995

Faster Possibility Detection by Combining Two Approaches.
Proceedings of the Distributed Algorithms, 9th International Workshop, 1995

Storage Replication and Layout in Video-on-Demand Servers.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 1995

1994
Addendum to "Proof Rules for Flush Channels".
IEEE Trans. Software Eng., 1994

An Operational Approach to Combining Classical Set Theory and Functional Programming Languages.
Proceedings of the Theoretical Aspects of Computer Software, 1994


  Loading...