Now showing items 1-5 of 5

    • Flow-Limited Authorization 

      Arden, Owen; Liu, Jed; Myers, Andrew (2015-05-08)
      Because information flow control mechanisms often rely on an underlying authorization mechanism, their security guarantees can be subverted by weaknesses in authorization. Conversely, the security of authorization can ...
    • JMatch: Java plus Pattern Matching 

      Liu, Jed; Myers, Andrew C. (Cornell University, 2002-10-18)
      The JMatch language extends Java with \emph{iterable abstract pattern matching}, pattern matching that is compatible with the data abstraction features of Java and makes iteration abstractions convenient. JMatch has ...
    • A Language for Securely Referencing Persistent Information in a Federated System 

      Liu, Jed; Myers, Andrew C. (2014-01-17)
      Referential integrity, which guarantees that named resources can be accessed when referenced, is an important property for reliability and security. In distributed systems, however, the attempt to provide referential ...
    • Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency (Technical Report) 

      Sheff, Isaac; Magrino, Tom; Liu, Jed; Myers, Andrew C.; van Renesse, Robbert (2016-08-16)
      Modern applications often operate on data in multiple administrative domains. In this federated setting, participants may not fully trust each other. These distributed applications use transactions as a core mechanism ...
    • Secure web applications via automatic partitioning 

      Chong, Stephen; Liu, Jed; Myers, Andrew C.; Qi, Xin; Vikram, K.; Zheng, Lantian; Zheng, Xin (Cornell University, 2007-03-28)
      Web applications are now critical infrastructure. To improve the user interface, some application functionality is typically implemented as client-side JavaScript code. Currently there are no good methods for deciding ...