Deepak Garg
Deepak Garg
Max Planck Institute for Software Systems (MPI-SWS), Saarland Informatics Campus (SIC)
Verified email at mpi-sws.org - Homepage
Title
Cited by
Cited by
Year
Verification of information flow and access control policies with dependent types
A Nanevski, A Banerjee, D Garg
2011 IEEE Symposium on Security and Privacy, 165-179, 2011
142*2011
A logic of secure systems and its application to trusted computing
A Datta, J Franklin, D Garg, D Kaynar
Security and Privacy, 2009 30th IEEE Symposium on, 221-236, 2009
1302009
Policy auditing over incomplete logs: Theory, implementation and applications
D Garg, L Jia, A Datta
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1222011
Experiences in the logical specification of the HIPAA and GLBA privacy laws
H DeYoung, D Garg, L Jia, D Kaynar, A Datta
Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010
113*2010
Non-interference in constructive authorization logic
D Garg, F Pfenning
Computer Security Foundations Workshop, 2006. 19th IEEE, 11 pp.-296, 2006
1122006
Information flow control in WebKit’s JavaScript bytecode
A Bichhawat, V Rajani, D Garg, C Hammer
International Conference on Principles of Security and Trust, 159-178, 2014
862014
A modal deconstruction of access control logics
D Garg, M Abadi
International Conference on Foundations of Software Science and …, 2008
862008
A linear logic of authorization and knowledge
D Garg, L Bauer, K Bowers, F Pfenning, M Reiter
Computer Security–ESORICS 2006, 297-312, 2006
852006
Relational cost analysis.
E Çiçek, G Barthe, M Gaboardi, D Garg, J Hoffmann
POPL 17, 316-329, 2017
502017
A proof-carrying file system
D Garg, F Pfenning
Security and Privacy (SP), 2010 IEEE Symposium on, 349-364, 2010
502010
Light-Weight Contexts: An {OS} Abstraction for Safety and Performance
J Litton, A Vahldiek-Oberwagner, E Elnikety, D Garg, B Bhattacharjee, ...
12th {USENIX} Symposium on Operating Systems Design and Implementation …, 2016
472016
Consumable credentials in logic-based access-control systems
KD Bowers, L Bauer, D Garg, F Pfenning, MK Reiter
Proceedings of the 14th Annual Network and Distributed System Security …, 2007
472007
An authorization logic with explicit time
H DeYoung, D Garg, F Pfenning
Computer Security Foundations Symposium, 2008. CSF'08. IEEE 21st, 133-145, 2008
452008
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms⋆
A Datta, J Blocki, N Christin, H DeYoung, D Garg, L Jia, D Kaynar, ...
422011
Compositional system security with interface-confined adversaries
D Garg, J Franklin, D Kaynar, A Datta
Electronic Notes in Theoretical Computer Science 265, 49-71, 2010
352010
Robust and compositional verification of object capability patterns.
D Swasey, D Garg, D Dreyer
PACMPL 1 (OOPSLA), 89:1-89:26, 2017
33*2017
A relational logic for higher-order programs
A Aguirre, G Barthe, M Gaboardi, D Garg, PY Strub
Proceedings of the ACM on Programming Languages 1 (ICFP), 21, 2017
312017
Generalizing permissive-upgrade in dynamic information flow analysis
A Bichhawat, V Rajani, D Garg, C Hammer
Proceedings of the Ninth Workshop on Programming Languages and Analysis for …, 2014
302014
Refinement types for incremental computational complexity
E Çiçek, D Garg, U Acar
European Symposium on Programming Languages and Systems, 406-431, 2015
292015
Secure compilation and hyperproperty preservation
M Patrignani, D Garg
2017 IEEE 30th Computer Security Foundations Symposium (CSF), 392-404, 2017
282017
The system can't perform the operation now. Try again later.
Articles 1–20