Ikuti
Christian Skalka
Christian Skalka
Associate Professor of Computer Science, University of Vermont
Email yang diverifikasi di uvm.edu
Judul
Dikutip oleh
Dikutip oleh
Tahun
Authorization in trust management: Features and foundations
PC Chapin, C Skalka, XS Wang
ACM Computing Surveys (CSUR) 40 (3), 1-48, 2008
1392008
A systematic approach to static access control
F Pottier, C Skalka, S Smith
Programming Languages and Systems: 10th European Symposium on Programming …, 2001
129*2001
History effects and verification
C Skalka, S Smith
Asian Symposium on Programming Languages and Systems, 107-128, 2004
1022004
Static enforcement of security with types
C Skalka, S Smith
Proceedings of the fifth ACM SIGPLAN international conference on Functional …, 2000
972000
Types and trace effects of higher order programs
C Skalka, S Smith, D Van Horn
Journal of Functional Programming 18 (2), 179-249, 2008
672008
Predicting posttraumatic stress disorder risk: a machine learning approach
S Wshah, C Skalka, M Price
JMIR mental health 6 (7), e13946, 2019
662019
Efficient differentially private secure aggregation for federated learning via hardness of learning with errors
T Stevens, C Skalka, C Vincent, J Ring, S Clark, J Near
31st USENIX Security Symposium (USENIX Security 22), 1379-1395, 2022
582022
Usability evaluation of a mobile monitoring system to assess symptoms after a traumatic injury: a mixed-methods study
M Price, T Sawyer, M Harris, C Skalka
JMIR mental health 3 (1), e5023, 2016
412016
Self-identifying sensor data
S Chong, C Skalka, JA Vaughan
Proceedings of the 9th ACM/IEEE International Conference on Information …, 2010
382010
John Ring, Samuel Clark, and Joseph Near. Efficient differentially private secure aggregation for federated learning via hardness of learning with errors
T Stevens, C Skalka, C Vincent
31st USENIX Security Symposium (USENIX Security 22), 1379-1395, 2022
372022
Correct audit logging: Theory and practice
S Amir-Mohammadian, S Chong, C Skalka
International Conference on Principles of Security and Trust, 139-162, 2016
302016
Risk assessment in distributed authorization
P Chapin, C Skalka, XS Wang
Proceedings of the 2005 ACM workshop on Formal methods in security …, 2005
282005
Static use-based object confinement
C Skalka, S Smith
International Journal of Information Security 4, 87-104, 2005
262005
Risk management for distributed authorization
C Skalka, XS Wang, P Chapin
Journal of Computer Security 15 (4), 447-489, 2007
252007
Methods for host-based intrusion detection with deep learning
JH Ring IV, CM Van Oort, S Durst, V White, JP Near, C Skalka
Digital Threats: Research and Practice (DTRAP) 2 (4), 1-29, 2021
242021
The short‐term dynamics of posttraumatic stress disorder symptoms during the acute posttrauma period
M Price, AC Legrand, ZMF Brier, J Gratton, C Skalka
Depression and anxiety 37 (4), 313-320, 2020
232020
Programming languages and systems security
C Salka
IEEE security & privacy 3 (3), 80-83, 2005
222005
Trust but verify: Authorization for web services
C Skalka, XS Wang
Proceedings of the 2004 workshop on Secure web service, 47-55, 2004
202004
Syntactic type soundness for HM (X)
C Skalka, F Pottier
Electronic notes in theoretical computer science 75, 61-74, 2003
202003
Tracking post-trauma psychopathology using mobile applications: a usability study
M Price, K van Stolk-Cooke, HL Ward, M O’Keefe, J Gratton, C Skalka, ...
Journal of Technology in Behavioral Science 2, 41-48, 2017
192017
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20