Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Hicks, Boniface
add a person with the name Hicks, Boniface
 

Other publications of authors with the same name

Jifclipse: development tools for security-typed languages., , and . PLAS, page 1-10. ACM, (2007)Channels: Runtime System Infrastructure for Security-Typed Languages., , and . ACSAC, page 443-452. IEEE Computer Society, (2007)A logical specification and analysis for SELinux MLS policy., , , , and . SACMAT, page 91-100. ACM, (2007)Trusted declassification: : high-level policy for a security-typed language., , , and . PLAS, page 65-74. ACM, (2006)A logical specification and analysis for SELinux MLS policy., , , , and . ACM Trans. Inf. Syst. Secur., 13 (3): 26:1-26:31 (2010)From Languages to Systems: Understanding Practical Application Development in Security-typed Languages., , and . ACSAC, page 153-164. IEEE Computer Society, (2006)Non-Invasive Methods for Host Certification., , , , and . SecureComm, page 1-10. IEEE, (2006)From Trusted to Secure: Building and Executing Applications That Enforce System Security., , , and . USENIX Annual Technical Conference, page 205-218. USENIX, (2007)Noninvasive Methods for Host Certification., , , , and . ACM Trans. Inf. Syst. Secur., (2008)An architecture for enforcing end-to-end access control over web applications., , , , , , , and . SACMAT, page 163-172. ACM, (2010)