Follow
David A. Naumann
David A. Naumann
Professor of Computer Science, Stevens Institute of Technology
Verified email at cs.stevens.edu - Homepage
Title
Cited by
Cited by
Year
Secure Information Flow and Pointer Confinement in a Java-like Language.
A Banerjee, DA Naumann
CSFW 2, 253, 2002
2482002
Stack-based access control and secure information flow
A Banerjee, DA Naumann
Journal of functional programming 15 (2), 131-177, 2005
2042005
Friends need a bit more: Maintaining invariants over shared state
M Barnett, DA Naumann
Mathematics of Program Construction: 7th International Conference, MPC 2004 …, 2004
1512004
Expressive declassification policies and modular static enforcement
A Banerjee, DA Naumann, S Rosenberg
2008 IEEE Symposium on Security and Privacy (sp 2008), 339-353, 2008
1452008
Regional logic for local reasoning about global invariants
A Banerjee, DA Naumann, S Rosenberg
ECOOP 2008–Object-Oriented Programming: 22nd European Conference Paphos …, 2008
1442008
Representation independence, confinement and access control
A Banerjee, DA Naumann
Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of …, 2002
1382002
Ownership confinement ensures representation independence for object-oriented programs
A Banerjee, DA Naumann
Journal of the ACM (JACM) 52 (6), 894-960, 2005
1282005
Information flow monitor inlining
A Chudnov, DA Naumann
2010 23rd IEEE Computer Security Foundations Symposium, 200-214, 2010
962010
Deriving an information flow checker and certifying compiler for java
G Barthe, D Naumann, T Rezk
2006 IEEE Symposium on Security and Privacy (S&P'06), 13 pp.-242, 2006
842006
From coupling relations to mated invariants for checking information flow
DA Naumann
ESORICS 6, 279-296, 2006
762006
History-based access control and secure information flow
A Banerjee, DA Naumann
Construction and Analysis of Safe, Secure, and Interoperable Smart Devices …, 2005
762005
Beyond stack inspection: A unified access-control and information-flow security model
M Pistoia, A Banerjee, DA Naumann
2007 IEEE Symposium on Security and Privacy (SP'07), 149-163, 2007
742007
A weakest precondition semantics for refinement of object-oriented programs
A Cavalcanti, DA Naumann
IEEE Transactions on Software Engineering 26 (8), 713-728, 2000
712000
A weakest precondition semantics for an object-oriented language of refinement
A Cavalcanti, DA Naumann
FM’99—Formal Methods: World Congress on Formal Methods in the Development …, 1999
701999
A weakest precondition semantics for an object-oriented language of refinement
A Cavalcanti, DA Naumann
FM’99—Formal Methods: World Congress on Formal Methods in the Development …, 1999
701999
Using access control for secure information flow in a Java-like language
A Banerjee, DA Naumann
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 155-169, 2003
662003
Towards imperative modules: Reasoning about invariants and sharing of mutable state
DA Naumann, M Barnett
Theoretical Computer Science 365 (1-2), 143-168, 2006
642006
99.44% pure: Useful abstractions in specifications
M Barnett, DA Naumann, W Schulte, Q Sun
ECOOP workshop on formal techniques for Java-like programs (FTfJP), 2004
642004
Guiding a general-purpose C verifier to prove cryptographic protocols
F Dupressoir, AD Gordon, J Jürjens, DA Naumann
Journal of Computer Security 22 (5), 823-866, 2014
602014
Closing internal timing channels by transformation
A Russo, J Hughes, D Naumann, A Sabelfeld
Advances in Computer Science-ASIAN 2006. Secure Software and Related Issues …, 2007
602007
The system can't perform the operation now. Try again later.
Articles 1–20