default search action
J. G. Cederquist
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j3]Hervé Paulino, Ana Almeida Matos, Jan Cederquist, Marco Giunti, João Matos, António Ravara:
AtomiS: Data-Centric Synchronization Made Practical. Proc. ACM Program. Lang. 7(OOPSLA2): 116-145 (2023) - [i3]Hervé Paulino, Ana Almeida Matos, Jan Cederquist, Marco Giunti, João Matos, António Ravara:
Sound Atomicity Inference for Data-Centric Synchronization. CoRR abs/2309.05483 (2023)
2010 – 2019
- 2019
- [i2]Ana Almeida Matos, Jan Cederquist:
Information flow in a distributed security setting. CoRR abs/1901.01111 (2019) - 2014
- [c13]Ana Almeida Matos, Jan Cederquist:
Distributed Noninterference. PDP 2014: 760-764 - 2013
- [c12]Ana Almeida Matos, Jan Cederquist:
Informative Types and Effects for Hybrid Migration Control. RV 2013: 21-39 - 2011
- [j2]Ana Almeida Matos, Jan Cederquist:
Non-disclosure for distributed mobile code. Math. Struct. Comput. Sci. 21(6): 1111-1181 (2011) - [c11]Mohammad Torabi Dashti, Jan Cederquist, Yanjing Wang:
Risk Balance in Optimistic Non-repudiation Protocols. Formal Aspects in Security and Trust 2011: 263-277 - [c10]Jan Cederquist, Mohammad Torabi Dashti:
Complexity of fairness constraints for the Dolev-Yao attacker model. SAC 2011: 1502-1509
2000 – 2009
- 2007
- [j1]J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini:
Audit-based compliance control. Int. J. Inf. Sec. 6(2-3): 133-151 (2007) - [c9]Jan Cederquist, Muhammad Torabi Dashti, Sjouke Mauw:
A Certified Email Protocol Using Key Chains. AINA Workshops (1) 2007: 525-530 - [c8]M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle:
Extended privilege inheritance in RBAC. AsiaCCS 2007: 383-385 - 2006
- [c7]Jan Cederquist, Muhammad Torabi Dashti:
An intruder model for verifying liveness in security protocols. FMSE 2006: 23-32 - 2005
- [c6]J. G. Cederquist, Ricardo Corin, Muhammad Torabi Dashti:
On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol. ICICS 2005: 27-39 - [c5]J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog:
An Audit Logic for Accountability. POLICY 2005: 34-43 - [i1]J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog:
An Audit Logic for Accountability. CoRR abs/cs/0502091 (2005) - 2004
- [c4]Gilles Barthe, Jan Cederquist, Sabrina Tarento:
A Machine-Checked Formalization of the Generic Model and the Random Oracle Model. IJCAR 2004: 385-399 - [c3]Jan Cederquist, Muhammad Torabi Dashti:
Formal Analysis of a Fair Payment Protocol. Formal Aspects in Security and Trust 2004: 41-54
1990 – 1999
- 1996
- [c2]Jan Cederquist:
An Implementation of the Heine-Borel Covering Theorem in Type Theory. TYPES 1996: 46-65 - 1995
- [c1]Jan Cederquist, Sara Negri:
A Constructive Proof of the Heine-Borel Covering Theorem for Formal Reals. TYPES 1995: 62-75
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint