Now showing items 1-5 of 5

    • Civitas: A Secure Voting System 

      Clarkson, Michael R.; Chong, Stephen; Myers, Andrew C. (Cornell University, 2007-05-17)
      Civitas is the first electronic voting system that is coercion-resistant, universally and voter verifiable, and suitable for remote voting. This paper describes the design and implementation of Civitas. Assurance is ...
    • End-to-End Enforcement of Erasure and Declassification 

      Chong, Stephen; Myers, Andrew C. (2008-04-09)
      Declassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of completely removing the information from the ...
    • Information-Flow Security for Interactive Programs 

      O'Neill, Kevin R.; Clarkson, Michael R.; Chong, Stephen (Cornell University, 2006-04-17)
      Interactive programs allow users to engage in input and output throughout execution. The ubiquity of such programs motivates the development of models for reasoning about their information-flow security, yet no such ...
    • Scalable Extensibility via Nested Inheritance 

      Nystrom, Nathaniel; Chong, Stephen; Myers, Andrew (Cornell University, 2004-08-04)
      Inheritance is a useful mechanism for factoring and reusing code. However, it has limitations for building extensible systems. We describe nested inheritance, a mechanism that addresses some of the limitations of ordinary ...
    • Secure web applications via automatic partitioning 

      Chong, Stephen; Liu, Jed; Myers, Andrew C.; Qi, Xin; Vikram, K.; Zheng, Lantian; Zheng, Xin (Cornell University, 2007-03-28)
      Web applications are now critical infrastructure. To improve the user interface, some application functionality is typically implemented as client-side JavaScript code. Currently there are no good methods for deciding ...