other persons with the same name:
2010 | ||
---|---|---|
37 | David A. Naumann, Anindya Banerjee: Dynamic Boundaries: Information Hiding by Second Order Framing with First Order Assertions. ESOP 2010: 2-22 | |
2009 | ||
36 | Avraham Shinnar, Marco Pistoia, Anindya Banerjee: A language for information flow: dynamic tracking in multiple interdependent dimensions. PLAS 2009: 125-131 | |
35 | V. Benjamin Livshits, Aditya V. Nori, Sriram K. Rajamani, Anindya Banerjee: Merlin: specification inference for explicit information flow problems. PLDI 2009: 75-86 | |
2008 | ||
34 | Anindya Banerjee, David A. Naumann, Stan Rosenberg: Regional Logic for Local Reasoning about Global Invariants. ECOOP 2008: 387-411 | |
33 | Elvira Albert, Anindya Banerjee, Sophia Drossopoulou, Marieke Huisman, Atsushi Igarashi, Gary T. Leavens, Peter Müller, Tobias Wrigstad: Formal Techniques for Java-Like Programs. ECOOP Workshops 2008: 70-76 | |
32 | Anindya Banerjee, David A. Naumann, Stan Rosenberg: Expressive Declassification Policies and Modular Static Enforcement. IEEE Symposium on Security and Privacy 2008: 339-353 | |
31 | Anindya Banerjee, Michael Barnett, David A. Naumann: Boogie Meets Regions: A Verification Experience Report. VSTTE 2008: 177-191 | |
2007 | ||
30 | Torben Amtoft, Anindya Banerjee: Verification condition generation for conditional information flow. FMSE 2007: 2-11 | |
29 | Marco Pistoia, Anindya Banerjee, David A. Naumann: Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model. IEEE Symposium on Security and Privacy 2007: 149-163 | |
28 | Anindya Banerjee, David A. Naumann, Stan Rosenberg: Towards a logical account of declassification. PLAS 2007: 61-66 | |
27 | Venkatesh Prasad Ranganath, Torben Amtoft, Anindya Banerjee, John Hatcliff, Matthew B. Dwyer: A new foundation for control dependence and slicing for modern program structures. ACM Trans. Program. Lang. Syst. 29(5): (2007) | |
26 | Anindya Banerjee, Roberto Giacobazzi, Isabella Mastroeni: What You Lose is What You Leak: Information Leakage in Declassification Policies. Electr. Notes Theor. Comput. Sci. 173: 47-66 (2007) | |
25 | Torben Amtoft, Anindya Banerjee: A logic for information flow analysis with an application to forward slicing of simple imperative programs. Sci. Comput. Program. 64(1): 3-28 (2007) | |
2006 | ||
24 | Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jensen, David A. Schmidt: Automata-Based Confidentiality Monitoring. ASIAN 2006: 75-89 | |
23 | Torben Amtoft, Sruthi Bandhakavi, Anindya Banerjee: A logic for information flow in object-oriented programs. POPL 2006: 91-102 | |
2005 | ||
22 | Anindya Banerjee, Heiko Mantel, David A. Naumann, Andrei Sabelfeld: Language-Based Security, 5.-10. October 2003 IBFI, Schloss Dagstuhl, Germany 2005 | |
21 | Anindya Banerjee, David A. Naumann: State Based Ownership, Reentrance, and Encapsulation. ECOOP 2005: 387-411 | |
20 | Venkatesh Prasad Ranganath, Torben Amtoft, Anindya Banerjee, Matthew B. Dwyer, John Hatcliff: A New Foundation for Control-Dependence and Slicing for Modern Program Structures. ESOP 2005: 77-93 | |
19 | Anindya Banerjee, David A. Naumann: Ownership confinement ensures representation independence for object-oriented programs. J. ACM 52(6): 894-960 (2005) | |
18 | Anindya Banerjee, David A. Naumann: Stack-based access control and secure information flow. J. Funct. Program. 15(2): 131-177 (2005) | |
2004 | ||
17 | Anindya Banerjee, David A. Naumann: History-Based Access Control and Secure Information Flow. CASSIS 2004: 27-48 | |
16 | Torben Amtoft, Anindya Banerjee: Information Flow Analysis in Logical Form. SAS 2004: 100-115 | |
15 | Qi Sun, Anindya Banerjee, David A. Naumann: Modular and Constraint-Based Information Flow Inference for an Object-Oriented Language. SAS 2004: 84-99 | |
2003 | ||
14 | Anindya Banerjee, David A. Naumann: Using Access Control for Secure Information Flow in a Java-like Language. CSFW 2003: 155-169 | |
13 | Anindya Banerjee, Heiko Mantel, David A. Naumann, Andrei Sabelfeld: 03411 Abstracts Collection - Language Based Security. Language Based Security 2003 | |
12 | Anindya Banerjee, Heiko Mantel, David A. Naumann, Andrei Sabelfeld: 03411 Final Report - Language Based Security. Language Based Security 2003 | |
11 | Anindya Banerjee, Thomas P. Jensen: Modular Control-Flow Analysis with Rank 2 Intersection Types. Mathematical Structures in Computer Science 13(1): 87-124 (2003) | |
2002 | ||
10 | Anindya Banerjee, David A. Naumann: Secure Information Flow and Pointer Confinement in a Java-like Language. CSFW 2002: 253- | |
9 | Anindya Banerjee, David A. Naumann: Representation independence, confinement and access control [extended abstract]. POPL 2002: 166-177 | |
8 | Anindya Banerjee, David A. Naumann: Ownership Confinement Ensures Representation Independence for Object-Oriented Programs CoRR cs.PL/0212003: (2002) | |
2001 | ||
7 | Anindya Banerjee, Nevin Heintze, Jon G. Riecke: Design and Correctness of Program Transformations Based on Control-Flow Analysis. TACS 2001: 420-447 | |
1999 | ||
6 | Anindya Banerjee, Nevin Heintze, Jon G. Riecke: Region Analysis and the Polymorphic Lambda Calculus. LICS 1999: 88-97 | |
5 | Martín Abadi, Anindya Banerjee, Nevin Heintze, Jon G. Riecke: A Core Calculus of Dependency. POPL 1999: 147-160 | |
1998 | ||
4 | Anindya Banerjee, David A. Schmidt: Stackability in the Simply-Typed Call-by-Value lambda Calculus. Sci. Comput. Program. 31(1): 47-73 (1998) | |
1997 | ||
3 | Anindya Banerjee: A Modular, Polyvariant, and Type-Based Closure Analysis. ICFP 1997: 1-10 | |
1994 | ||
2 | Anindya Banerjee, David A. Schmidt: Stackability in the Simply-Typed Call-by-Value Lambda Calculus. SAS 1994: 131-146 | |
1993 | ||
1 | Anindya Banerjee, David A. Schmidt: A Categorical Interpretation of Landin's Correspondence Principle. MFPS 1993: 587-602 |
1 | Martín Abadi | [5] |
2 | Elvira Albert | [33] |
3 | Torben Amtoft (Torben Amtoft Hansen) | [16] [20] [23] [25] [27] [30] |
4 | Sruthi Bandhakavi | [23] |
5 | Michael Barnett | [31] |
6 | Sophia Drossopoulou | [33] |
7 | Matthew B. Dwyer | [20] [27] |
8 | Roberto Giacobazzi | [26] |
9 | Gurvan Le Guernic | [24] |
10 | John Hatcliff | [20] [27] |
11 | Nevin Heintze | [5] [6] [7] |
12 | Marieke Huisman | [33] |
13 | Atsushi Igarashi | [33] |
14 | Thomas P. Jensen | [11] [24] |
15 | Gary T. Leavens | [33] |
16 | V. Benjamin Livshits | [35] |
17 | Heiko Mantel | [12] [13] [22] |
18 | Isabella Mastroeni | [26] |
19 | Peter Müller | [33] |
20 | David A. Naumann | [8] [9] [10] [12] [13] [14] [15] [17] [18] [19] [21] [22] [28] [29] [31] [32] [34] [37] |
21 | Aditya V. Nori | [35] |
22 | Marco Pistoia | [29] [36] |
23 | Sriram K. Rajamani | [35] |
24 | Venkatesh Prasad Ranganath | [20] [27] |
25 | Jon G. Riecke | [5] [6] [7] |
26 | Stan Rosenberg | [28] [32] [34] |
27 | Andrei Sabelfeld | [12] [13] [22] |
28 | David A. Schmidt | [1] [2] [4] [24] |
29 | Avraham Shinnar | [36] |
30 | Qi Sun | [15] |
31 | Tobias Wrigstad | [33] |