Corin Pitcher
Corin Pitcher
Associate Professor of Computer Science, DePaul University
Verified email at cdm.depaul.edu - Homepage
Title
Cited by
Cited by
Year
Towards a theory of accountability and audit
R Jagadeesan, A Jeffrey, C Pitcher, J Riely
European Symposium on Research in Computer Security, 152-167, 2009
1322009
Specifications of a high-level conflict-free firewall policy language for multi-domain networks
B Zhang, E Al-Shaer, R Jagadeesan, J Riely, C Pitcher
Proceedings of the 12th ACM symposium on Access control models and …, 2007
1022007
Local memory via layout randomization
R Jagadeesan, C Pitcher, J Rathke, J Riely
2011 IEEE 24th Computer Security Foundations Symposium, 161-174, 2011
592011
Generative operational semantics for relaxed memory models
R Jagadeesan, C Pitcher, J Riely
European Symposium on Programming, 307-326, 2010
522010
Timed constraint programming: a declarative approach to usage control
R Jagadeesan, W Marrero, C Pitcher, V Saraswat
Proceedings of the 7th ACM SIGPLAN international conference on Principles …, 2005
352005
Timed Constraint Programming: A Declarative Approach to Usage Control
C Pitcher, V Saraswat
PPDP..., 164, 2005
35*2005
Visibly pushdown expression effects for XML stream processing
C Pitcher
Programming Language Technologies for XML 1060, 1-14, 2005
342005
Open bisimulation for aspects
R Jagadeesan, C Pitcher, J Riely
Proceedings of the 6th international conference on Aspect-oriented software …, 2007
212007
Similarity and bisimilarity for countable non-determinism and higher-order functions
SB Lassen, CS Pitcher
Electronic Notes in Theoretical Computer Science 10, 246-266, 1998
211998
Do As I SaY! Programmatic access control with explicit identities
A Cirillo, R Jagadeesan, C Pitcher, J Riely
20th IEEE Computer Security Foundations Symposium (CSF'07), 16-30, 2007
182007
Functional programming and erratic non-determinism
CS Pitcher
University of Oxford, 2001
182001
Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects
A Cirillo, R Jagadeesan, C Pitcher, J Riely
European Symposium on Programming, 208-223, 2008
142008
An Extensible Approach to Session Polymorphism
M Goto, R Jagadeesan, A Jeffrey, C Pitcher, J Riely
Mathematical Structures in Computer Science, 44, 2011
13*2011
Quarantining weakness
R Jagadeesan, G Petri, C Pitcher, J Riely
European Symposium on Programming, 492-511, 2013
122013
λ-RBAC: Programming with role-based access control
R Jagadeesan, A Jeffrey, C Pitcher, J Riely
International Colloquium on Automata, Languages, and Programming, 456-467, 2006
72006
Open bisimulation for aspects
R Jagadeesan, C Pitcher, J Riely
Transactions on Aspect-Oriented Software Development V, 72-132, 2009
62009
Dynamic policy discovery with remote attestation
C Pitcher, J Riely
International Conference on Foundations of Software Science and Computation …, 2006
52006
Certificates for Verifiable Forensics
R Jagadeesan, CM Lubinski, C Pitcher, J Riely, C Winebrinner
2014 IEEE 27th Computer Security Foundations Symposium, 33-47, 2014
22014
Types for relaxed memory models using correspondence assertions
M Goto, R Jagadeesan, C Pitcher, J Riely
Submitted for publication, 0
2
Noninterference for Intuitionist Necessity
R Jagadeesan, C Pitcher, J Riely
Indian Conference on Logic and Its Applications, 185-196, 2013
12013
The system can't perform the operation now. Try again later.
Articles 1–20