Corin Pitcher

According to our database1, Corin Pitcher authored at least 20 papers between 1997 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2016
An extensible approach to session polymorphism.
Math. Struct. Comput. Sci., 2016

2014
Certificates for Verifiable Forensics.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

2013
Noninterference for Intuitionist Necessity.
Proceedings of the Logic and Its Applications, 5th Indian Conference, 2013

Quarantining Weakness - Compositional Reasoning under Relaxed Memory Models (Extended Abstract).
Proceedings of the Programming Languages and Systems, 2013

2012
Types for relaxed memory models.
Proceedings of the 8th ACM SIGPLAN Workshop on Types in Languages Design and Implementation, 2012

Succour to the Confused Deputy - Types for Capabilities.
Proceedings of the Programming Languages and Systems - 10th Asian Symposium, 2012

2011
Local Memory via Layout Randomization.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

2010
Generative Operational Semantics for Relaxed Memory Models.
Proceedings of the Programming Languages and Systems, 2010

2009
Open Bisimulation for Aspects.
LNCS Trans. Aspect Oriented Softw. Dev., 2009

Towards a Theory of Accountability and Audit.
Proceedings of the Computer Security, 2009

2008
Lambda-RBAC: Programming with Role-Based Access Control.
Log. Methods Comput. Sci., 2008

Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects (Extended Abstract).
Proceedings of the Programming Languages and Systems, 2008

2007
Specifications of a high-level conflict-free firewall policy language for multi-domain networks.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Do As I SaY! Programmatic Access Control with Explicit Identities.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

2006
<i>lambda</i>-RBAC: Programming with Role-Based Access Control.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

Dynamic Policy Discovery with Remote Attestation.
Proceedings of the Foundations of Software Science and Computation Structures, 2006

Games for Controls.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

2005
Timed constraint programming: a declarative approach to usage control.
Proceedings of the 7th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2005

2001
Functional programming and erratic non-determinism.
PhD thesis, 2001

1997
Similarity and Bisimilarity for Countable Non-Determinism and Higher-Order Functions.
Proceedings of the Second Workshop on Higher-Order Operational Techniques in Semantics, 1997


  Loading...