City Research Online

Items where Author is "Hunt, S."

Up a level
Export as [feed] RSS 2.0 [feed] RSS
Group by: Type | No Grouping
Number of items: 13.

Article

Thurman, N., Schifferes, S., Fletcher, R., Newman, N., Hunt, S. and Schapals, A. K. (2016). Giving computers a nose for news: exploring the limits of story detection and verification. Digital Journalism, 4(7), pp. 838-848. doi: 10.1080/21670811.2016.1149436

Van Delft, B., Hunt, S. and Sands, D. (2015). Very static enforcement of dynamic policies. Lecture Notes in Computer Science, 9036, pp. 32-52. doi: 10.1007/978-3-662-46666-7_3

Del Tedesco, F., Hunt, S. and Sands, D. (2011). A semantic hierarchy for erasure policies. Lecture Notes in Computer Science, 7093 L, pp. 352-369. doi: 10.1007/978-3-642-25560-1_24

Hunt, S., Clark, D. and Malacaria, P. (2007). A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, 15(3), pp. 321-371.

Clark, D., Hunt, S. and Malacaria, P. (2005). Quantified Interference for a While Language. Electronic Notes in Theoretical Computer Science, 112(SPEC), pp. 149-166. doi: 10.1016/j.entcs.2004.01.018

Hunt, S., Clark, D. and Malacaria, P. (2002). Quantitative analysis of the leakage of confidential data. Electronic Notes in Theoretical Computer Science, 59(3), pp. 1-14. doi: 10.1016/S1571-0661(04)00290-7

Book Section

Hunt, S. and Sands, D. (2020). New Program Abstractions for Privacy. In: Di Pierro, A., Malacaria, A. and Nagarajan, P. (Eds.), From Lambda Calculus to Cybersecurity Through Program Analysis. . Springer. ISBN 9783030411022

Conference or Workshop Item

Hunt, S. and Sands, D. (2011). From exponential to polynomial-time security typing via principal types. Lecture Notes in Computer Science, 6602 L, pp. 297-316. ISSN 0302-9743

Hunt, S. and Sands, D. (2008). Just forget it - The semantics and enforcement of information erasure. Lecture Notes in Computer Science, 4960, pp. 239-253. ISSN 0302-9743

Hunt, S. and Clark, D. (2008). Non-interference for deterministic interactive programs. Paper presented at the 5th International Workshop on Formal Aspects in Security and Trust (FAST2008), Oct 2008, Malaga, Spain.

Hunt, S., Askarov, A., Sabelfeld, A. and Sands, D. (2008). Termination-insensitive noninterference leaks more than just a bit. Paper presented at the 13th European Symposium on Research in Computer Security, Oct 2008, Malaga, Spain.

Hunt, S. and Sands, D. (2006). On flow-sensitive security types. ACM SIGPLAN-SIGACT, 41, pp. 79-90. ISSN 0362-1340

Hunt, S. and Mastroeni, I. (2005). The PER model of abstract non-interference. In: Hankin, C. and Siveroni, I. (Eds.), Static Analysis. SAS 2005. Lecture Notes in Computer Science. (pp. 171-185). Berlin: Springer. ISBN 978-3-540-28584-7

This list was generated on Sun May 31 05:14:39 2020 UTC.