Dennis M. Volpano

Affiliations:
  • Johns Hopkins University, Laurel, MD, USA


According to our database1, Dennis M. Volpano authored at least 36 papers between 1984 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Quantitative Toolchain Assurance.
CoRR, 2023

2022
Network Programming via Computable Products.
CoRR, 2022

2017
Modular network function virtualization.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

2014
LEGO(TM) Bricks for Reactive Programming.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Towards systematic detection and resolution of network control conflicts.
Proceedings of the third workshop on Hot topics in software defined networking, 2014

2012
Programmable Diagnostic Network Measurement with Localization and Traffic Observation.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

2000
Basic research in information privacy.
ACM SIGSOFT Softw. Eng. Notes, 2000

Verifying Secrets and Relative Secrecy.
Proceedings of the POPL 2000, 2000

Secure Introduction of One-Way Functions.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

1999
Probabilistic Noninterference in a Concurrent Language.
J. Comput. Secur., 1999

Confinement Properties for Multi-Threaded Programs.
Proceedings of the Fifteenth Conference on Mathematical Foundations of Progamming Semantics, 1999

The MFPS XV Security Session.
Proceedings of the Fifteenth Conference on Mathematical Foundations of Progamming Semantics, 1999

Safety versus Secrecy.
Proceedings of the Static Analysis, 6th International Symposium, 1999

Formalization and Proof of Secrecy Properties.
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999

1998
Confinement properties for programming languages.
SIGACT News, 1998

A Sound Polymorphic Type System for a Dialect of C.
Sci. Comput. Program., 1998

Wired Wired World: Wired and Wired-Er.
IEEE Internet Comput., 1998

Secure Information Flow in a Multi-Threaded Imperative Language.
Proceedings of the POPL '98, 1998

Language Issues in Mobile Program Security.
Proceedings of the Mobile Agents and Security, 1998

1997
Secure flow typing.
Comput. Secur., 1997

A Type-Based Approach to Program Security.
Proceedings of the TAPSOFT'97: Theory and Practice of Software Development, 1997

Eliminating Covert Flows with Minimum Typings.
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997

1996
Polymorphic typing of Variables and References.
ACM Trans. Program. Lang. Syst., 1996

A Sound Type System for Secure Flow Analysis.
J. Comput. Secur., 1996

Lower Bounds on Type Checking Overloading.
Inf. Process. Lett., 1996

On the Systematic Design of Web Languages.
ACM Comput. Surv., 1996

Provably Secure Programming Languages for Remote Evaluation.
ACM Comput. Surv., 1996

Towards an ML-Style Polymorphic Type System for C.
Proceedings of the Programming Languages and Systems, 1996

1995
Type Checking Coherent Overloading.
Softw. Concepts Tools, 1995

A Type Soundness Proof for Variables in LCF ML.
Inf. Process. Lett., 1995

1994
Haskell-style Overloading is NP-hard.
Proceedings of the IEEE Computer Society 1994 International Conference on Computer Languages, 1994

1991
Subtypes and Quantification.
ACM Trans. Program. Lang. Syst., 1991

On the Complexity of ML Typability with Overloading.
Proceedings of the Functional Programming Languages and Computer Architecture, 1991

1990
The Transform - a New Language Construct.
Struct. Program., 1990

1985
Software Templates.
Proceedings of the Proceedings, 1985

1984
Empirical investigation of COBOL features.
Inf. Process. Manag., 1984


  Loading...