David A. Naumann
Orcid: 0000-0002-7634-6150Affiliations:
- Stevens Institute of Technology, NJ, USA
According to our database1,
David A. Naumann
authored at least 94 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the NASA Formal Methods - 16th International Symposium, 2024
2023
Proc. ACM Program. Lang., January, 2023
J. Comput. Secur., 2023
Dagstuhl Artifacts Ser., 2023
Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications (Extended Version).
CoRR, 2023
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2023
Proceedings of the 37th European Conference on Object-Oriented Programming, 2023
Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
ACM Trans. Program. Lang. Syst., December, 2022
2021
Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science, 2021
2020
Proceedings of the ISMM '20: 2020 ACM SIGPLAN International Symposium on Memory Management, 2020
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles, 2020
Proceedings of the Formal Methods and Software Engineering, 2020
2019
Proceedings of the Unifying Theories of Programming - 7th International Symposium, 2019
2018
ACM Trans. Program. Lang. Syst., 2018
Assuming You Know: Epistemic Semantics of Relational Annotations for Expressive Flow Policies.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
2017
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
An Illustrated Guide to the Model Theory of Supertype Abstraction and Behavioral Subtyping.
Proceedings of the Engineering Trustworthy Software Systems - Third International School, 2017
Hypercollecting semantics and its application to static analysis of information flow.
Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, 2017
2016
J. Log. Algebraic Methods Program., 2016
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications, 2016
Proceedings of the 36th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
2015
ACM Trans. Program. Lang. Syst., 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
J. Comput. Secur., 2014
Proceedings of the Verified Software: Theories, Tools and Experiments, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
2013
State Based Encapsulation for Modular Reasoning about Behavior-Preserving Refactorings.
Proceedings of the Aliasing in Object-Oriented Programming. Types, 2013
Analysis of authentication and key establishment in inter-generational mobile telephony.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Semantics, 2013
Proceedings of the Programming Languages and Systems - 11th Asian Symposium, 2013
2012
Theor. Comput. Sci., 2012
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2012
2011
Symbolic Analysis for Security of Roaming Protocols in Mobile Networks - [Extended Abstract].
Proceedings of the Security and Privacy in Communication Networks, 2011
2010
Proceedings of the Verified Software: Theories, 2010
Dynamic Boundaries: Information Hiding by Second Order Framing with First Order Assertions.
Proceedings of the Programming Languages and Systems, 2010
Refactoring and representation independence for class hierarchies: extended abstract.
Proceedings of the 12th Workshop on Formal Techniques for Java-Like Programs, 2010
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
2008
Proceedings of the Verified Software: Theories, 2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the ECOOP 2008, 2008
2007
Formal Aspects Comput., 2007
Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007
Modular verification of higher-order methods with mandatory calls specified by model programs.
Proceedings of the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2007
2006
Theor. Comput. Sci., 2006
Proceedings of the Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the Emerging Trends in Information and Communication Security, 2006
Proceedings of the Computer Security, 2006
Proceedings of the Advances in Computer Science, 2006
2005
Ownership confinement ensures representation independence for object-oriented programs.
J. ACM, 2005
Proceedings of the Verified Software: Theories, 2005
Proceedings of the Theorem Proving in Higher Order Logics, 18th International Conference, 2005
Proceedings of the ECOOP 2005, 2005
2004
Modular and Constraint-Based Information Flow Inference for an Object-Oriented Language.
Proceedings of the Static Analysis, 11th International Symposium, 2004
Proceedings of the Mathematics of Program Construction, 7th International Conference, 2004
Proceedings of the Construction and Analysis of Safe, 2004
2003
Proceedings of the Global Telecommunications Conference, 2003
Proceedings of the Language-Based Security, 5.-10. October 2003, 2003
Proceedings of the Language-Based Security, 5.-10. October 2003, 2003
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003
2002
Theor. Comput. Sci., 2002
Proceedings of the Conference Record of POPL 2002: The 29th SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2002
Proceedings of the FME 2002: Formal Methods, 2002
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002
2001
Predicate transformer semantics of a higher-order imperative language with record subtyping.
Sci. Comput. Program., 2001
Proceedings of the 3rd international ACM SIGPLAN conference on Principles and practice of declarative programming, 2001
2000
IEEE Trans. Software Eng., 2000
1999
Proceedings of the FM'99 - Formal Methods, 1999
1998
Math. Struct. Comput. Sci., 1998
Towards squiggly refinement algebra.
Proceedings of the Programming Concepts and Methods, 1998
Proceedings of the Mathematics of Program Construction, 1998
1995
Formal Aspects Comput., 1995
1994
Inf. Process. Lett., 1994
Proceedings of the 25th SIGCSE Technical Symposium on Computer Science Education, 1994
Predicate Transformer Semantics of an Oberon-Like Language.
Proceedings of the Programming Concepts, 1994
Proceedings of the Programming Languages and System Architectures, 1994
1991