Christian Skalka

Orcid: 0000-0002-0402-809X

According to our database1, Christian Skalka authored at least 38 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Language-Based Security for Low-Level MPC.
Proceedings of the 26th International Symposium on Principles and Practice of Declarative Programming, 2024

2022
Secret Sharing Sharing For Highly Scalable Secure Aggregation.
CoRR, 2022

Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors.
Proceedings of the 31st USENIX Security Symposium, 2022

2020
Maybe tainted data: Theory and a case study.
J. Comput. Secur., 2020

Types and Abstract Interpretation for Authorization Hook Advice.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

2019
Proof-Carrying Network Code.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2017
ACCESSPROV: Tracking the Provenance of Access Control Decisions.
Proceedings of the 9th USENIX Workshop on the Theory and Practice of Provenance, 2017

On Risk in Access Control Enforcement.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Life on the Edge: Unraveling Policies into Configurations.
Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2017

2016
Evolving Spatially Aggregated Features from Satellite Imagery for Regional Modeling.
Proceedings of the Parallel Problem Solving from Nature - PPSN XIV, 2016

Correct Audit Logging: Theory and Practice.
Proceedings of the Principles of Security and Trust - 5th International Conference, 2016

In-Depth Enforcement of Dynamic Integrity Taint Analysis.
Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, 2016

2015
Self-Identifying Data for Fair Use.
ACM J. Data Inf. Qual., 2015

A Genetic Programming Approach to Cost-Sensitive Control in Resource Constrained Sensor Systems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

2014
SpartanRPC: Remote Procedure Call Authorization in Wireless Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2014

2013
Snowcloud: A Complete Data Gathering System for Snow Hydrology Research.
Proceedings of the Real-World Wireless Sensor Networks, 2013

Scalaness/nesT: type specialized staged programming for sensor networks.
Proceedings of the Generative Programming: Concepts and Experiences, 2013

2011
Type-specialized staged programming with process separation.
High. Order Symb. Comput., 2011

2010
SpartanRPC: Secure WSN middleware for cooperating domains.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Self-identifying sensor data.
Proceedings of the 9th International Conference on Information Processing in Sensor Networks, 2010

2008
Types and trace effects for object orientation.
High. Order Symb. Comput., 2008

Types and trace effects of higher order programs.
J. Funct. Program., 2008

Authorization in trust management: Features and foundations.
ACM Comput. Surv., 2008

2007
Risk management for distributed authorization.
J. Comput. Secur., 2007

Type safe dynamic linking for JVM access control.
Proceedings of the 9th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2007

The Nuggetizer: Abstracting Away Higher-Orderness for Program Verification.
Proceedings of the Programming Languages and Systems, 5th Asian Symposium, 2007

2006
Trust but verify: Authorization for web services.
Comput. Syst. Sci. Eng., 2006

Specifying distributed trust management in LolliMon.
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006

2005
A systematic approach to static access control.
ACM Trans. Program. Lang. Syst., 2005

Static use-based object confinement.
Int. J. Inf. Sec., 2005

Programming Languages and Systems Security.
IEEE Secur. Priv., 2005

A Type and Effect System for Flexible Abstract Interpretation of Java: (Extended Abstract).
Proceedings of the First International Workshop on Abstract Interpretation of Object-oriented Languages, 2005

Trace effects and object orientation.
Proceedings of the 7th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2005

Risk assessment in distributed authorization.
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005

2004
History Effects and Verification.
Proceedings of the Programming Languages and Systems: Second Asian Symposium, 2004

2002
Set Types and Applications.
Proceedings of the International Workshop in Types in Programming, 2002

Syntactic Type Soundness for HM(X).
Proceedings of the International Workshop in Types in Programming, 2002

2000
Static enforcement of security with types.
Proceedings of the Fifth ACM SIGPLAN International Conference on Functional Programming (ICFP '00), 2000


  Loading...