Automata-based confidentiality monitoring G Le Guernic, A Banerjee, T Jensen, DA Schmidt Advances in Computer Science-ASIAN 2006. Secure Software and Related Issues …, 2007 | 174 | 2007 |
Automaton-based confidentiality monitoring of concurrent programs G Le Guernic 20th IEEE Computer Security Foundations Symposium (CSF'07), 218-232, 2007 | 103 | 2007 |
Confidentiality enforcement using dynamic information flow analyses G Le Guernic Kansas State University, 2007 | 74 | 2007 |
Confidentiality enforcement using dynamic information flow analyses G Le Guernic Kansas State University, 2007 | 74 | 2007 |
Epistemic temporal logic for information flow security M Balliu, M Dam, G Le Guernic Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and …, 2011 | 66 | 2011 |
A security-preserving compiler for distributed programs: From information-flow policies to cryptographic mechanisms C Fournet, G Le Guernic, T Rezk Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 49 | 2009 |
Encover: Symbolic exploration for information flow security M Balliu, M Dam, G Le Guernic 2012 IEEE 25th Computer Security Foundations Symposium, 30-44, 2012 | 43 | 2012 |
Monitoring information flow G Le Guernic, T Jensen Proc. Workshop on Foundations of Computer Security, 19-30, 2005 | 35 | 2005 |
TreeDroid: a tree automaton based approach to enforcing data processing policies M Dam, G Le Guernic, A Lundblad Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 31 | 2012 |
Precise dynamic verification of confidentiality G Le Guernic 5th International Verification Workshop–VERIFY’08, 82, 2008 | 19 | 2008 |
Reverse-engineering reusable language modules from legacy domain-specific languages D Méndez-Acuña, JA Galindo, B Combemale, A Blouin, B Baudry, ... Software Reuse: Bridging with Social-Awareness: 15th International …, 2016 | 13 | 2016 |
Information flow testing: The third path towards confidentiality guarantee G Le Guernic Advances in Computer Science–ASIAN 2007. Computer and Network Security: 12th …, 2007 | 12 | 2007 |
Automaton-based non-interference monitoring G Le Guernic, A Banerjee, D Schmidt | 8 | 2006 |
Precise dynamic verification of noninterference G Le Guernic | 4 | 2008 |
Automaton-based Non-interference Monitoring of Concurrent Programs G Le Guernic | 4 | 2007 |
Experience report on the development of a specialized multi-view multi-stakeholder model-based engineering framework G Le Guernic Proceedings of the 17th ACM SIGPLAN International Workshop on Domain …, 2019 | 3 | 2019 |
Système de recherche de méthodes Java basé sur leur signature N Bonnel, G Le Guernic 4e Manifestation des Jeunes Chercheurs en Sciences et Technologies de l …, 2006 | 3 | 2006 |
FL-system's Intelligent Cache G Le Guernic, J Perret MajecSTIC 2005: Manifestation des Jeunes Chercheurs francophones dans les …, 2005 | 3 | 2005 |
From Monolithic to Microservice Architecture: The Case of Extensible and Domain-Specific IDEs R Belafia, P Jeanjean, O Barais, G Le Guernic, B Combemale 2021 ACM/IEEE International Conference on Model Driven Engineering Languages …, 2021 | 2 | 2021 |
Automatic generation of Truffle-based interpreters for Domain-Specific Languages M Leduc, G Jouneaux, T Degueule, G Le Guernic, O Barais, ... The Journal of Object Technology 19 (2), 1-21, 2020 | 2 | 2020 |