Name
Affiliation
Papers
DAVID NAUMANN
Stevens Institute of Technology, Hoboken NJ 07030, USA
76
Collaborators
Citations 
PageRank 
54
1101
84.12
Referers 
Referees 
References 
1126
980
1482
Search Limit
1001000
Title
Citations
PageRank
Year
Alignment Completeness for Relational Hoare Logics00.342021
Type-Based Declassification for Free.00.342020
Typed-based Relaxed Noninterference for Free00.342019
Whither Specifications as Programs.00.342019
Assuming You Know: Epistemic Semantics of Relational Annotations for Expressive Flow Policies20.362018
Hypercollecting Semantics and its Application to Static Analysis of Information Flow.30.382017
An Illustrated Guide to the Model Theory of Supertype Abstraction and Behavioral Subtyping.00.342017
Spartan Jester: End-to-End Information Flow Control for Hybrid Android Applications10.352017
Specifying and Verifying Advanced Control Features.20.372016
Calculational Design of Information Flow Monitors (extended version).00.342016
Calculational Design of Information Flow Monitors50.402016
Relational Logic with Framing and Hypotheses.00.342016
Relational Logic with Framing and Hypotheses: Technical Report.00.342016
Inlined Information Flow Monitoring for JavaScript160.522015
Towards patterns for heaps and imperative lambdas.00.342015
Behavioral Subtyping, Specification Inheritance, and Modular Reasoning300.872015
Information Flow Monitoring as Abstract Interpretation for Relational Logic130.512014
A Logical Analysis of Framing for Specifications with Pure Method Calls.10.352014
Analysis of Authentication and Key Establishment in Inter-generational Mobile Telephony50.482013
A Simple Semantics And Static Analysis For Stack Inspection00.342013
Local Reasoning for Global Invariants, Part II: Dynamic Boundaries30.362013
Laws of Programming for References.00.342013
Local Reasoning for Global Invariants, Part I: Region Logic90.482013
Refactoring and representation independence for class hierarchies40.442012
Decision procedures for region logic30.392012
Symbolic Analysis for Security of Roaming Protocols in Mobile Networks - [Extended Abstract].40.412011
Guiding a general-purpose C verifier to prove cryptographic protocols.160.632011
Refactoring and representation independence for class hierarchies: extended abstract30.442010
Local reasoning and dynamic framing for the composite pattern and its clients90.482010
Dynamic Boundaries: Information Hiding by Second Order Framing with First Order Assertions40.512010
Information Flow Monitor Inlining351.232010
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, PLAS 2009, Dublin, Ireland, 15-21 June, 200992.202009
Category Theoretic Models of Data Refinement30.472009
Regional Logic for Local Reasoning about Global Invariants461.882008
Boogie Meets Regions: A Verification Experience Report130.762008
Expressive Declassification Policies and Modular Static Enforcement561.642008
Towards a logical account of declassification80.572007
Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model281.082007
Observational purity and encapsulation100.582007
On assertion-based encapsulation for object invariants and simulations30.502007
Deriving an Information Flow Checker and Certifying Compiler for Java270.902006
Allowing state changes in specifications30.382006
From coupling relations to mated invariants for checking information flow230.932006
Closing internal timing channels by transformation190.762006
Verifying a secure information flow analyzer100.682005
Stack-based access control and secure information flow1013.532005
Observational purity and encapsulation70.632005
Language-Based Security, 5.-10. October 200320.912005
State based ownership, reentrance, and encapsulation190.872005
History-based access control and secure information flow722.642004
  • 1
  • 2