Number of items: 17.
Conference or Workshop Item (A Paper)
Chowdhury, Omar and Garg, Deepak and Jia, Limin and Datta, Anupam
(2015)
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
Datta, Anupam and Garg, Deepak and Jia, Limin and Sen, Shayak
(2015)
A Logic of Programs with Interface-Confined Code.
Datta, Anupam and Garg, Deepak and Kaynar, Dilsun Kirli and Sharma, Divya and Sinha, Arunesh
(2015)
Program Actions as Actual Causes: A Building Block for Accountability.
Datta, Anupam and Garg, Deepak and Jia, Limin and Chowdhury, Omar
(2014)
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
Oh, Se Eun and Chun, Ji Young and Jia, Limin and Garg, Deepak and Gunter, Carl A. and Datta, Anupam
(2014)
Privacy-preserving audit for broker-based health information exchange.
Chowdhury, Omar and Jia, Limin and Garg, Deepak and Datta, Anupam
(2014)
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
Datta, Anupam and Garg, Deepak and Jia, Limin
(2011)
Policy auditing over incomplete logs: theory, implementation and applications.
Blocki, Jeremiah and Christin, Nicolas and Datta, Anupam and Sinha, Arunesh
(2011)
Regret Minimizing Audits: A Learning-theoretic Basis for Privacy Protection.
Datta, Anupam and Blocki, Jeremiah and Christin, Nicolas and DeYoung, Henry and Garg, Deepak and Jia, Limin and Kaynar, Dilsun Kirli and Sinha, Arunesh
(2011)
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
DeYoung, Henry and Garg, Deepak and Jia, Limin and Kaynar, Dilsun Kirli and Datta, Anupam
(2010)
Experiences in the logical specification of the HIPAA and GLBA privacy laws.
Backes, Michael and Datta, Anupam and Derek, Ante and Mitchell, John C. and Turuani, Mathieu
(2005)
Compositional Analysis of Contract Signing Protocols.
Article
Datta, Anupam and Garg, Deepak and Jia, Limin and Sen, Shayak
(2015)
System M: A Program Logic for Code Sandboxing and Identification.
The Computing Research Repository (CoRR).
Datta, Anupam and Garg, Deepak and Kaynar, Dilsun Kirli and Jia, Limin and Franklin, Jason
(2011)
On Adversary Models and Compositional Security.
IEEE Security & Privacy, 9 (3).
pp. 26-32.
Garg, Deepak and Jia, Limin and Datta, Anupam
(2011)
A Logical Method for Policy Enforcement over Evolving Audit Logs.
CoRR, abs/11.
Garg, Deepak and Franklin, Jason and Kaynar, Dilsun Kirli and Datta, Anupam
(2010)
Compositional System Security with Interface-Confined Adversaries.
Electr. Notes Theor. Comput. Sci., 265.
49–71.
Backes, Michael and Datta, Anupam and Derek, Ante and Mitchell, John C. and Turuani, Mathieu
(2006)
Compositional Analysis of Contract Signing Protocols.
Theoretical Computer Science, 367 (1-2).
pp. 33-56.
Other
Backes, Michael and Datta, Anupam and Derek, Ante and Mitchell, John C. and Ramanathan, Ajith and Scedrov, Andre
(2006)
Games and the Impossibility of Realizable Ideal Functionality.
This list was generated on Thu Nov 21 12:58:09 2024 CET.