Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Arden, Owen
add a person with the name Arden, Owen
 

Other publications of authors with the same name

Cryptographically Secure Information Flow Control on Key-Value Stores., , , , and . ACM Conference on Computer and Communications Security, page 1893-1907. ACM, (2017)JRIF: Reactive Information Flow Control for Java., , , and . Foundations of Security, Protocols, and Equational Reasoning, volume 11565 of Lecture Notes in Computer Science, page 70-88. Springer, (2019)Warranties for Faster Strong Consistency., , , , and . NSDI, page 503-517. USENIX Association, (2014)Using Program Analysis to Improve Database Applications., , , , and . IEEE Data Eng. Bull., 37 (1): 48-59 (2014)StatusQuo: Making Familiar Abstractions Perform Using Program Analysis., , , , and . CIDR, www.cidrdb.org, (2013)Speeding up database applications with Pyxis., , , and . SIGMOD Conference, page 969-972. ACM, (2013)Information Flow Control for Distributed Trusted Execution Environments., , and . CSF, page 304-318. IEEE, (2019)Nonmalleable Information Flow Control., , and . ACM Conference on Computer and Communications Security, page 1875-1891. ACM, (2017)Sharing Mobile Code Securely with Information Flow Control., , , , , and . IEEE Symposium on Security and Privacy, page 191-205. IEEE Computer Society, (2012)Flow-Limited Authorization., , and . CSF, page 569-583. IEEE Computer Society, (2015)