A systematic approach to static access control F Pottier, C Skalka, S Smith Programming Languages and Systems: 10th European Symposium on Programming …, 2001 | 127* | 2001 |
Authorization in trust management: Features and foundations PC Chapin, C Skalka, XS Wang ACM Computing Surveys (CSUR) 40 (3), 1-48, 2008 | 119 | 2008 |
History effects and verification C Skalka, S Smith Asian Symposium on Programming Languages and Systems, 107-128, 2004 | 96 | 2004 |
Static enforcement of security with types C Skalka, S Smith Proceedings of the fifth ACM SIGPLAN international conference on Functional …, 2000 | 94 | 2000 |
A systematic approach to static access control F Pottier, C Skalka, S Smith Programming Languages and Systems: 10th European Symposium on Programming …, 2001 | 80 | 2001 |
Types and trace effects of higher order programs C Skalka, S Smith, D Van Horn Journal of Functional Programming 18 (2), 179-249, 2008 | 64 | 2008 |
Predicting posttraumatic stress disorder risk: a machine learning approach S Wshah, C Skalka, M Price JMIR mental health 6 (7), e13946, 2019 | 51 | 2019 |
Usability evaluation of a mobile monitoring system to assess symptoms after a traumatic injury: a mixed-methods study M Price, T Sawyer, M Harris, C Skalka JMIR mental health 3 (1), e5023, 2016 | 38 | 2016 |
Self-identifying sensor data S Chong, C Skalka, JA Vaughan Proceedings of the 9th ACM/IEEE International Conference on Information …, 2010 | 38 | 2010 |
Efficient differentially private secure aggregation for federated learning via hardness of learning with errors T Stevens, C Skalka, C Vincent, J Ring, S Clark, J Near 31st USENIX Security Symposium (USENIX Security 22), 1379-1395, 2022 | 29 | 2022 |
Risk assessment in distributed authorization P Chapin, C Skalka, XS Wang Proceedings of the 2005 ACM workshop on Formal methods in security …, 2005 | 28 | 2005 |
Correct audit logging: Theory and practice S Amir-Mohammadian, S Chong, C Skalka Principles of Security and Trust: 5th International Conference, POST 2016 …, 2016 | 27 | 2016 |
Risk management for distributed authorization C Skalka, XS Wang, P Chapin Journal of Computer Security 15 (4), 447-489, 2007 | 26 | 2007 |
Static use-based object confinement C Skalka, S Smith International Journal of Information Security 4, 87-104, 2005 | 26 | 2005 |
The short‐term dynamics of posttraumatic stress disorder symptoms during the acute posttrauma period M Price, AC Legrand, ZMF Brier, J Gratton, C Skalka Depression and anxiety 37 (4), 313-320, 2020 | 20 | 2020 |
Trust but verify: authorization for web services C Skalka, XS Wang Proceedings of the 2004 workshop on Secure web service, 47-55, 2004 | 20 | 2004 |
Syntactic type soundness for HM (X) C Skalka, F Pottier Electronic notes in theoretical computer science 75, 61-74, 2003 | 20 | 2003 |
Programming languages and systems security C Salka IEEE security & privacy 3 (3), 80-83, 2005 | 19 | 2005 |
Tracking post-trauma psychopathology using mobile applications: a usability study M Price, K van Stolk-Cooke, HL Ward, M O’Keefe, J Gratton, C Skalka, ... Journal of Technology in Behavioral Science 2, 41-48, 2017 | 18 | 2017 |
Types and trace effects for object orientation C Skalka Higher-Order and Symbolic Computation 21, 239-282, 2008 | 18 | 2008 |