default search action
Christian Skalka
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c28]Christian Skalka, Joseph P. Near:
Language-Based Security for Low-Level MPC. PPDP 2024: 16:1-16:14 - [i4]Christian Skalka, Joseph P. Near:
Language-Based Security for Low-Level MPC. CoRR abs/2407.16504 (2024) - 2022
- [c27]Timothy Stevens, Christian Skalka, Christelle Vincent, John H. Ring, Samuel Clark, Joseph P. Near:
Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors. USENIX Security Symposium 2022: 1379-1395 - [i3]Timothy Stevens, Joseph P. Near, Christian Skalka:
Secret Sharing Sharing For Highly Scalable Secure Aggregation. CoRR abs/2201.00864 (2022) - 2021
- [j13]John H. Ring, Colin Michael Van Oort, Samson Durst, Vanessa White, Joseph P. Near, Christian Skalka:
Methods for Host-based Intrusion Detection with Deep Learning. DTRAP 2(4): 26:1-26:29 (2021) - [i2]Timothy Stevens, Christian Skalka, Christelle Vincent, John H. Ring, Samuel Clark, Joseph P. Near:
Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors. CoRR abs/2112.06872 (2021) - 2020
- [j12]Christian Skalka, Sepehr Amir-Mohammadian, Samuel Clark:
Maybe tainted data: Theory and a case study. J. Comput. Secur. 28(3): 295-335 (2020) - [c26]Christian Skalka, David Darais, Trent Jaeger, Frank Capobianco:
Types and Abstract Interpretation for Authorization Hook Advice. CSF 2020: 139-152
2010 – 2019
- 2019
- [c25]Christian Skalka, John H. Ring, David Darais, Minseok Kwon, Sahil Gupta, Kyle Diller, Steffen Smolka, Nate Foster:
Proof-Carrying Network Code. CCS 2019: 1115-1129 - 2017
- [c24]Shrutarshi Basu, Nate Foster, Hossein Hojjat, Paparao Palacharla, Christian Skalka, Xi Wang:
Life on the Edge: Unraveling Policies into Configurations. ANCS 2017: 178-190 - [c23]Giuseppe Petracca, Frank Capobianco, Christian Skalka, Trent Jaeger:
On Risk in Access Control Enforcement. SACMAT 2017: 31-42 - [c22]Frank Capobianco, Christian Skalka, Trent Jaeger:
ACCESSPROV: Tracking the Provenance of Access Control Decisions. TaPP 2017 - [i1]Sam Kriegman, Marcin Szubert, Josh C. Bongard, Christian Skalka:
Evolving Spatially Aggregated Features from Satellite Imagery for Regional Modeling. CoRR abs/1706.07888 (2017) - 2016
- [c21]Sepehr Amir-Mohammadian, Christian Skalka:
In-Depth Enforcement of Dynamic Integrity Taint Analysis. PLAS@CCS 2016: 43-56 - [c20]Sepehr Amir-Mohammadian, Stephen Chong, Christian Skalka:
Correct Audit Logging: Theory and Practice. POST 2016: 139-162 - [c19]Sam Kriegman, Marcin Szubert, Josh C. Bongard, Christian Skalka:
Evolving Spatially Aggregated Features from Satellite Imagery for Regional Modeling. PPSN 2016: 707-716 - 2015
- [j11]Stephen Chong, Christian Skalka, Jeffrey A. Vaughan:
Self-Identifying Data for Fair Use. ACM J. Data Inf. Qual. 5(3): 11:1-11:30 (2015) - [c18]Afsoon Yousefi Zowj, Josh C. Bongard, Christian Skalka:
A Genetic Programming Approach to Cost-Sensitive Control in Resource Constrained Sensor Systems. GECCO 2015: 1295-1302 - 2014
- [j10]Peter C. Chapin, Christian Skalka:
SpartanRPC: Remote Procedure Call Authorization in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 17(2): 5:1-5:30 (2014) - 2013
- [c17]Peter C. Chapin, Christian Skalka, Scott F. Smith, Michael Watson:
Scalaness/nesT: type specialized staged programming for sensor networks. GPCE 2013: 135-144 - [c16]Christian Skalka, Jeffrey Frolik:
Snowcloud: A Complete Data Gathering System for Snow Hydrology Research. REALWSN 2013: 3-14 - 2011
- [j9]Yu David Liu, Christian Skalka, Scott F. Smith:
Type-specialized staged programming with process separation. High. Order Symb. Comput. 24(4): 341-385 (2011) - 2010
- [c15]Stephen Chong, Christian Skalka, Jeffrey A. Vaughan:
Self-identifying sensor data. IPSN 2010: 82-93 - [c14]Peter C. Chapin, Christian Skalka:
SpartanRPC: Secure WSN middleware for cooperating domains. MASS 2010: 61-70
2000 – 2009
- 2009
- [c13]Yu David Liu, Christian Skalka, Scott F. Smith:
Type-specialized staged programming with process separation. WGP@ICFP 2009: 49-60 - 2008
- [j8]Peter C. Chapin, Christian Skalka, Xiaoyang Sean Wang:
Authorization in trust management: Features and foundations. ACM Comput. Surv. 40(3): 9:1-9:48 (2008) - [j7]Christian Skalka, Scott F. Smith, David Van Horn:
Types and trace effects of higher order programs. J. Funct. Program. 18(2): 179-249 (2008) - [j6]Christian Skalka:
Types and trace effects for object orientation. High. Order Symb. Comput. 21(3): 239-282 (2008) - 2007
- [j5]Christian Skalka, Xiaoyang Sean Wang, Peter C. Chapin:
Risk management for distributed authorization. J. Comput. Secur. 15(4): 447-489 (2007) - [c12]Paritosh Shroff, Christian Skalka, Scott F. Smith:
The Nuggetizer: Abstracting Away Higher-Orderness for Program Verification. APLAS 2007: 2-18 - [c11]Christian Skalka:
Type safe dynamic linking for JVM access control. PPDP 2007: 51-62 - 2006
- [j4]Christian Skalka, Xiaoyang Sean Wang:
Trust but verify: Authorization for web services. Comput. Syst. Sci. Eng. 21(5) (2006) - [c10]Jeff Polakow, Christian Skalka:
Specifying distributed trust management in LolliMon. PLAS 2006: 37-46 - 2005
- [j3]Christian Skalka:
Programming Languages and Systems Security. IEEE Secur. Priv. 3(3): 80-83 (2005) - [j2]Christian Skalka, Scott F. Smith:
Static use-based object confinement. Int. J. Inf. Sec. 4(1-2): 87-104 (2005) - [j1]François Pottier, Christian Skalka, Scott F. Smith:
A systematic approach to static access control. ACM Trans. Program. Lang. Syst. 27(2): 344-382 (2005) - [c9]Peter C. Chapin, Christian Skalka, Xiaoyang Sean Wang:
Risk assessment in distributed authorization. FMSE 2005: 33-42 - [c8]Christian Skalka:
Trace effects and object orientation. PPDP 2005: 139-150 - [c7]Christian Skalka, Scott F. Smith, David Van Horn:
A Type and Effect System for Flexible Abstract Interpretation of Java: (Extended Abstract). AIOOL@VMCAI 2005: 111-124 - 2004
- [c6]Christian Skalka, Scott F. Smith:
History Effects and Verification. APLAS 2004: 107-128 - [c5]Christian Skalka, Xiaoyang Sean Wang:
Trust but verify: authorization for web services. SWS 2004: 47-55 - 2002
- [c4]Christian Skalka, François Pottier:
Syntactic Type Soundness for HM(X). TIP@MPC 2002: 61-74 - [c3]Christian Skalka, Scott F. Smith:
Set Types and Applications. TIP@MPC 2002: 75-94 - 2001
- [c2]François Pottier, Christian Skalka, Scott F. Smith:
A Systematic Approach to Static Access Control. ESOP 2001: 30-45 - 2000
- [c1]Christian Skalka, Scott F. Smith:
Static enforcement of security with types. ICFP 2000: 34-45
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 22:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint