Authorization in trust management: Features and foundations PC Chapin, C Skalka, XS Wang ACM Computing Surveys (CSUR) 40 (3), 1-48, 2008 | 139 | 2008 |
A systematic approach to static access control F Pottier, C Skalka, S Smith Programming Languages and Systems: 10th European Symposium on Programming …, 2001 | 129* | 2001 |
History effects and verification C Skalka, S Smith Asian Symposium on Programming Languages and Systems, 107-128, 2004 | 102 | 2004 |
Static enforcement of security with types C Skalka, S Smith Proceedings of the fifth ACM SIGPLAN international conference on Functional …, 2000 | 97 | 2000 |
Types and trace effects of higher order programs C Skalka, S Smith, D Van Horn Journal of Functional Programming 18 (2), 179-249, 2008 | 67 | 2008 |
Predicting posttraumatic stress disorder risk: a machine learning approach S Wshah, C Skalka, M Price JMIR mental health 6 (7), e13946, 2019 | 66 | 2019 |
Efficient differentially private secure aggregation for federated learning via hardness of learning with errors T Stevens, C Skalka, C Vincent, J Ring, S Clark, J Near 31st USENIX Security Symposium (USENIX Security 22), 1379-1395, 2022 | 58 | 2022 |
Usability evaluation of a mobile monitoring system to assess symptoms after a traumatic injury: a mixed-methods study M Price, T Sawyer, M Harris, C Skalka JMIR mental health 3 (1), e5023, 2016 | 41 | 2016 |
Self-identifying sensor data S Chong, C Skalka, JA Vaughan Proceedings of the 9th ACM/IEEE International Conference on Information …, 2010 | 38 | 2010 |
John Ring, Samuel Clark, and Joseph Near. Efficient differentially private secure aggregation for federated learning via hardness of learning with errors T Stevens, C Skalka, C Vincent 31st USENIX Security Symposium (USENIX Security 22), 1379-1395, 2022 | 37 | 2022 |
Correct audit logging: Theory and practice S Amir-Mohammadian, S Chong, C Skalka International Conference on Principles of Security and Trust, 139-162, 2016 | 30 | 2016 |
Risk assessment in distributed authorization P Chapin, C Skalka, XS Wang Proceedings of the 2005 ACM workshop on Formal methods in security …, 2005 | 28 | 2005 |
Static use-based object confinement C Skalka, S Smith International Journal of Information Security 4, 87-104, 2005 | 26 | 2005 |
Risk management for distributed authorization C Skalka, XS Wang, P Chapin Journal of Computer Security 15 (4), 447-489, 2007 | 25 | 2007 |
Methods for host-based intrusion detection with deep learning JH Ring IV, CM Van Oort, S Durst, V White, JP Near, C Skalka Digital Threats: Research and Practice (DTRAP) 2 (4), 1-29, 2021 | 24 | 2021 |
The short‐term dynamics of posttraumatic stress disorder symptoms during the acute posttrauma period M Price, AC Legrand, ZMF Brier, J Gratton, C Skalka Depression and anxiety 37 (4), 313-320, 2020 | 23 | 2020 |
Programming languages and systems security C Salka IEEE security & privacy 3 (3), 80-83, 2005 | 22 | 2005 |
Trust but verify: Authorization for web services C Skalka, XS Wang Proceedings of the 2004 workshop on Secure web service, 47-55, 2004 | 20 | 2004 |
Syntactic type soundness for HM (X) C Skalka, F Pottier Electronic notes in theoretical computer science 75, 61-74, 2003 | 20 | 2003 |
Tracking post-trauma psychopathology using mobile applications: a usability study M Price, K van Stolk-Cooke, HL Ward, M O’Keefe, J Gratton, C Skalka, ... Journal of Technology in Behavioral Science 2, 41-48, 2017 | 19 | 2017 |