Follow
Corin Pitcher
Corin Pitcher
Associate Professor of Computer Science, DePaul University
Verified email at cdm.depaul.edu - Homepage
Title
Cited by
Cited by
Year
Towards a theory of accountability and audit
R Jagadeesan, A Jeffrey, C Pitcher, J Riely
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
1452009
Specifications of a high-level conflict-free firewall policy language for multi-domain networks
B Zhang, E Al-Shaer, R Jagadeesan, J Riely, C Pitcher
Proceedings of the 12th ACM symposium on Access control models and …, 2007
1132007
Local memory via layout randomization
R Jagadeesan, C Pitcher, J Rathke, J Riely
2011 IEEE 24th Computer Security Foundations Symposium, 161-174, 2011
622011
Generative operational semantics for relaxed memory models
R Jagadeesan, C Pitcher, J Riely
Programming Languages and Systems: 19th European Symposium on Programming …, 2010
552010
Timed constraint programming: a declarative approach to usage control
R Jagadeesan, W Marrero, C Pitcher, V Saraswat
Proceedings of the 7th ACM SIGPLAN international conference on Principles …, 2005
382005
Timed Constraint Programming: A Declarative Approach to Usage Control
C Pitcher, V Saraswat
PPDP..., 164, 2005
38*2005
Visibly pushdown expression effects for XML stream processing
C Pitcher
Programming Language Technologies for XML 1060, 1-14, 2005
342005
Similarity and bisimilarity for countable non-determinism and higher-order functions
SB Lassen, CS Pitcher
Electronic Notes in Theoretical Computer Science 10, 246-266, 1998
241998
Open bisimulation for aspects
R Jagadeesan, C Pitcher, J Riely
Proceedings of the 6th international conference on Aspect-oriented software …, 2007
222007
Functional programming and erratic non-determinism
CS Pitcher
University of Oxford, 2001
182001
Do As I SaY! Programmatic access control with explicit identities
A Cirillo, R Jagadeesan, C Pitcher, J Riely
20th IEEE Computer Security Foundations Symposium (CSF'07), 16-30, 2007
172007
An Extensible Approach to Session Polymorphism
M Goto, R Jagadeesan, A Jeffrey, C Pitcher, J Riely
Mathematical Structures in Computer Science, 44, 2011
15*2011
Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects
A Cirillo, R Jagadeesan, C Pitcher, J Riely
European Symposium on Programming, 208-223, 2008
152008
Quarantining weakness: compositional reasoning under relaxed memory models
R Jagadeesan, G Petri, C Pitcher, J Riely
Programming Languages and Systems: 22nd European Symposium on Programming …, 2013
132013
Open bisimulation for aspects
R Jagadeesan, C Pitcher, J Riely
Transactions on Aspect-Oriented Software Development V, 72-132, 2009
122009
Lambda-RBAC: Programming with role-based access control
R Jagadeesan, A Jeffrey, C Pitcher, J Riely
Logical Methods in Computer Science 4, 2008
72008
Dynamic policy discovery with remote attestation
C Pitcher, J Riely
Foundations of Software Science and Computation Structures: 9th …, 2006
62006
An Extensible Approach to Session Polymorphism. MSCS 26, 3 (2016), 465–509
MA Goto, R Jagadeesan, A Jeffrey, C Pitcher, J Riely
52016
Certificates for Verifiable Forensics
R Jagadeesan, CM Lubinski, C Pitcher, J Riely, C Winebrinner
2014 IEEE 27th Computer Security Foundations Symposium, 33-47, 2014
22014
Noninterference for Intuitionist Necessity
R Jagadeesan, C Pitcher, J Riely
Logic and Its Applications: 5th Indian Conference, ICLA 2013, Chennai, India …, 2013
22013
The system can't perform the operation now. Try again later.
Articles 1–20