David Sands
Showing 54 publications
Reconciling Shannon and Scott with a Lattice of Computable Information
PropR: Property-Based Automatic Program Repair
New Program Abstractions for Privacy
Runtime verification of hyperproperties for deterministic programs
Paragon - Practical programming with information flow control
Data minimisation: A language-based approach
Sampling and Partitioning for Differential Privacy
Fault-resilient non-interference
Very static enforcement of dynamic policies
Differential Privacy: Now it’s Getting Personal
The Anatomy and Facets of Dynamic Policies
Paragon: Programming with information flow control (demo)
Fault-tolerant Non-interference
Paragon for Practical Programming with Information-Flow Control
A Datalog Semantics for Paralocks
Implementing Erasure Policies Using Taint Analysis
Safe Wrappers and Sane Policies for Self Protecting JavaScript
A Semantic Hierarchy for Erasure Policies
From Exponential to Polynomial-time Security Typing via Principal Types
Assumptions and guarantees for compositional noninterference
Specification and Verification of Side Channel Declassification
Paralocks: Role-based information flow control and beyond
Paralocks - Role-Based Information Flow Control and Beyond
Specification and Verification of Side Channel Declassification
Lightweight Self-Protecting JavaScript
Improving the semantics of imperfect security
Declassification: Dimensions and Principles
A user model for information erasure.
Flow-Sensitive Semantics for Dynamic Information Flow Policies
Termination-Insensitive Noninterference Leaks More Than Just a Bit.
Security Policy Enforcement for the OSGi Framework Using Aspect-Oriented Programming
Just Forget it - The Semantics and Enforcement of Information Erasure
On flow-sensitive security types
Flow locks: Towards a core calculus for dynamic flow policies
Towards a core calculus for dynamic flow policies
Noninterference in the presence of non-opaque pointers
Dimensions and Principles of Declassification
A Theorem Proving Approach to Analysis of Secure Information Flow
Timing Aware Information Flow Security for a JavaCard-like Bytecode
Controlled Declassification based on Intransitive Noninterference
Controlled Declassification based on Intransitive Noninterference
Erratic fudgets: a semantic theory for an embedded coordination language
Lambda Calculi and Linear Speedups
Possibilities and Limitations of Call-by-Need Space Improvement
On Confidentiality and Algorithms
A Per Model of Secure Information Flow in Sequential Programs
Probabilistic Noninterference for Multi-threaded Programs
Download publication list
You can download this list to your computer.
Filter and download publication list
As logged in user (Chalmers employee) you find more export functions in MyResearch.
You may also import these directly to Zotero or Mendeley by using a browser plugin. These are found herer:
Zotero Connector
Mendeley Web Importer
The service SwePub offers export of contents from Research in other formats, such as Harvard and Oxford in .RIS, BibTex and RefWorks format.
Showing 4 research projects
Perspex: Flexible and Transparent Local Differential Privacy
WebSec: Securing Web-driven Systems
AppFlow: Putting Information Flow Control to Work
Data-Driven Secure Business Intelligence (DataBIN)