Owen Arden
Owen Arden
Assistant Professor of Computer Science UCSC
Verified email at - Homepage
Cited by
Cited by
Automatic partitioning of database applications
A Cheung, O Arden, S Madden, AC Myers
arXiv preprint arXiv:1208.0271, 2012
Sharing mobile code securely with information flow control
O Arden, MD George, J Liu, K Vikram, A Askarov, AC Myers
2012 IEEE Symposium on Security and Privacy, 191-205, 2012
Nonmalleable information flow control
E Cecchetti, AC Myers, O Arden
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Fabric: Building open distributed systems securely by construction
J Liu, O Arden, MD George, AC Myers
Journal of Computer Security 25 (4-5), 367-426, 2017
System and apparatus to manage data using a peer-to-peer network and the blockchain
M Shadmon, L Cohen, D Abadi, O Arden
US Patent 10,868,865, 2020
Flow-limited authorization
O Arden, J Liu, AC Myers
2015 IEEE 28th Computer Security Foundations Symposium, 569-583, 2015
Warranties for faster strong consistency
J Liu, T Magrino, O Arden, MD George, AC Myers
11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014
StatusQuo: Making Familiar Abstractions Perform Using Program Analysis.
A Cheung, O Arden, S Madden, A Solar-Lezama, AC Myers
CIDR, 2013
Using Program Analysis to Improve Database Applications.
A Cheung, S Madden, A Solar-Lezama, O Arden, AC Myers
IEEE Data Eng. Bull. 37 (1), 48-59, 2014
Cryptographically secure information flow control on key-value stores
L Waye, P Buiras, O Arden, A Russo, S Chong
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
A calculus for flow-limited authorization
O Arden, AC Myers
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 135-149, 2016
Anylog: a grand unification of the internet of things
D Abadi, O Arden, F Nawab, M Shadmon
Conference on Innovative Data Systems Research (CIDR ‘20), 2020
Information flow control for distributed trusted execution environments
A Gollamudi, S Chong, O Arden
2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 304-30414, 2019
JRIF: reactive information flow control for java
E Kozyri, O Arden, AC Myers, FB Schneider
Foundations of Security, Protocols, and Equational Reasoning: Essays …, 2019
AttkFinder: Discovering attack vectors in PLC programs using information flow analysis
JH Castellanos, M Ochoa, AA Cardenas, O Arden, J Zhou
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
Total Eclipse of the enclave: detecting Eclipse attacks from inside TEEs
H Zheng, T Tran, O Arden
2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-5, 2021
A calculus for flow-limited authorization: Technical report
O Arden, AC Myers
Speeding up database applications with pyxis
A Cheung, O Arden, S Madden, AC Myers
Proceedings of the 2013 ACM SIGMOD International Conference on Management of …, 2013
Jif 3.5: Java information flow
T Magrino, J Liu, O Arden, C Isradisaikul, AC Myers
Software release, 2016
Secure distributed applications the decent way
H Zheng, O Arden
Proceedings of the 2021 International Symposium on Advanced Security on …, 2021
The system can't perform the operation now. Try again later.
Articles 1–20