-
Certificates for Verifiable Forensics.
pdf
Radha Jagadeesan, CM Lubinski, Corin Pitcher, James Riely, and Charles Winebrinner.
In Computer Security Foundations Symposium (CSF), 2014.
-
Quarantining Weakness: Compositional Reasoning Under Relaxed Memory Models (Extended Abstract).
Radha Jagadeesan, Gustavo Petri, Corin Pitcher, and James Riely.
In 22nd European Symposium on Programming, ESOP'13, 2013.
-
Non Interference for Intuitionist Necessity.
pdf
Radha Jagadeesan, Corin Pitcher, and James Riely.
In 5th Indian Conference on Logic and its Applications (ICLA), 2013.
-
An Extensible Approach to Session Polymorphism.
pdf
Matthew Goto, Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, and James Riely.
To appear in Math. Struct. in Comp. Science, Special Issue on Behavioural Types. Submitted 2011. Accepted 2012.
-
Succour to the Confused Deputy: Types for Capabilities.
pdf
Radha Jagadeesan, Corin Pitcher, and James Riely.
In 10th Asian Symposium on Programming Languages and Systems (APLAS), 2012.
(extended and corrected version of APLAS paper)
-
Types for Relaxed Memory Models.
Matthew Goto, Radha Jagadeesan, Corin Pitcher, and James Riely.
In The Seventh ACM SIGPLAN Workshop on Types in Language Design and Implementation (TLDI), 2012.
-
Local Memory via Layout Randomization.
pdf
Radha Jagadeesan, Corin Pitcher, Julian Rathke and James Riely.
In Computer Security Foundations Symposium (CSF), 2011.
-
Confidential Safety via Correspondence Assertions.
pdf
Radha Jagadeesan, Alan Jeffrey, Corin Pitcher and James Riely.
In Workshop on Foundations of Security and Privacy (FCS-PrivMod), 2010.
-
Generative Operational Semantics for Relaxed Memory Models.
pdf
Radha Jagadeesan, Corin Pitcher and James Riely.
In 19th European Symposium on Programming, ESOP 2010, 2010.
-
Towards a Theory of Accountability and Audit.
pdf
Radha Jagadeesan, Alan Jeffrey, Corin Pitcher and James Riely.
In 14th European Symposium on Research in Computer Security, ESORICS'09, 2009.
(extended and corrected version of ESORICS paper)
-
Open Bisimulation for Aspects.
pdf available from Springer
Radha Jagadeesan, Corin Pitcher and James Riely.
Transactions on Aspect-Oriented Software Development V, Lecture Notes in Computer Science 5490, pp. 72-132, 2009, Springer.
-
Trust and Authorization via Provenance and Integrity in Distributed Objects.
pdf
Andrew Cirillo, Radha Jagadeesan, Corin Pitcher and James Riely.
In 17th European Symposium on Programming, ESOP'08, 2008.
(extended version of ESOP paper with type and effect system, and results)
-
Lambda-RBAC: Programming with Role-Based Access Control.
pdf
Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, and James Riely.
In Logical Methods in Computer Science (LMCS). Volume 4, Issue 1, Paper 2, January 2008.
-
Do As I SaY! Programmatic Access Control with Explicit Identities.
pdf
Andrew Cirillo, Radha Jagadeesan, Corin Pitcher, James Riely.
In Computer Security Foundations Symposium (CSF), 2007.
(extended version of CSF paper with several typos and minor bugs fixed)
-
Specifications of A High-level Conflict-Free Firewall Policy Language for Multi-domain Networks.
pdf
Bin Zhang, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher.
In Proc. ACM Symposium on Access Control Models and Technologies (SACMAT), 2007.
-
Open Bisimulation for Aspects.
pdf
Radha Jagadeesan, Corin Pitcher, and James Riely.
In Proc. Sixth International Conference on Aspect-Oriented Software Development (AOSD '07).
-
lambda-RBAC: Programming with Role-Based Access Control.
pdf
Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, and James Riely.
In 33rd International Colloquium on Automata, Languages and Programming (ICALP), July 9-16, 2006.
(superseded by LMCS "Lambda-RBAC: Programming with Role-Based Access Control" above)
-
Games for Controls.
pdf
Krishnendu Chatterjee, Radha Jagadeesan, and Corin Pitcher.
In 19th IEEE Computer Security Foundations Workshop (CSFW), July 5-7, 2006.
-
Dynamic Policy Discovery with Remote Attestation.
pdf
Corin Pitcher and James Riely.
In Foundations of Software Science and Computation Structures (FOSSACS), March 25-31, 2006.
-
Timed constraint programming: a declarative approach to Usage Control.
pdf
Radha Jagadeesan, Wilfredo Marrero, Corin Pitcher, and Vijay Saraswat.
In Seventh ACM-SIGPLAN International Symposium on Principles and Practice of Declarative Programming (PPDP), July 11-13, 2005.
-
Visibly pushdown expression effects for XML stream processing.
pdf
Corin Pitcher.
In Programming Language Technologies for XML (PLAN-X), January 11, 2005.
-
Functional Programming and Erratic Non-Determinism.
pdf
Corin Pitcher.
D.Phil. dissertation, University of Oxford.
-
Similarity and bisimilarity for countable non-determinism and higher-order functions.
pdf
Søren Lassen and Corin Pitcher.
In Proc. 2nd Workshop on Higher Order Operational Techniques in Semantics, Stanford, December 1997, volume 10 of Electronic Notes in Theoretical Computer Science, pp1-21, 1998.
The documents contained in this directory are included by the contributing authors as a means to ensure timely
dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained
by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It
is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's
copyright. These works may not be reposted without the explicit permission of the copyright holder.
Some of this material is based upon work supported by the National Science Foundation. Any opinions, findings, and
conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the
views of the National Science Foundation.