Loading...
The system can't perform the operation now. Try again later.
Citations per year
Duplicate citations
The following articles are merged in Scholar. Their
combined citations
are counted only for the first article.
Merged citations
This "Cited by" count includes citations to the following articles in Scholar. The ones marked
*
may be different from the article in the profile.
Add co-authors
Co-authors
Follow
New articles by this author
New citations to this author
New articles related to this author's research
Email address for updates
Done
My profile
My library
Metrics
Alerts
Settings
Sign in
Sign in
Get my own profile
Cited by
View all
All
Since 2019
Citations
3459
1971
h-index
36
24
i10-index
61
50
0
400
200
100
300
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
9
29
46
80
107
118
131
105
147
145
143
187
198
297
285
361
301
386
331
Public access
View all
View all
32 articles
0 articles
available
not available
Based on funding mandates
Follow
Deepak Garg
Max Planck Institute for Software Systems
(MPI-SWS), Saarland Informatics Campus (SIC)
Verified email at mpi-sws.org -
Homepage
Formal Logic
Security
Privacy
Programming Languages
Articles
Cited by
Public access
Title
Sort
Sort by citations
Sort by year
Sort by title
Cited by
Cited by
Year
{ERIM}: Secure, Efficient In-process Isolation with Protection Keys ({{{{{MPK}}}}})
A Vahldiek-Oberwagner, E Elnikety, NO Duarte, M Sammler, P Druschel, ...
28th USENIX Security Symposium (USENIX Security 19), 1221-1238
, 2019
300
2019
Verification of information flow and access control policies with dependent types
A Nanevski, A Banerjee, D Garg
2011 IEEE Symposium on Security and Privacy, 165-179
, 2011
186
*
2011
Light-Weight Contexts: An OS Abstraction for Safety and Performance
J Litton, A Vahldiek-Oberwagner, E Elnikety, D Garg, B Bhattacharjee, ...
12th USENIX Symposium on Operating Systems Design and Implementation (OSDI …
, 2016
159
2016
Experiences in the logical specification of the HIPAA and GLBA privacy laws
H DeYoung, D Garg, L Jia, D Kaynar, A Datta
Proceedings of the 9th annual ACM workshop on Privacy in the electronic …
, 2010
142
*
2010
Policy auditing over incomplete logs: Theory, implementation and applications
D Garg, L Jia, A Datta
Proceedings of the 18th ACM conference on Computer and communications …
, 2011
140
2011
A logic of secure systems and its application to trusted computing
A Datta, J Franklin, D Garg, D Kaynar
Security and Privacy, 2009 30th IEEE Symposium on, 221-236
, 2009
134
2009
Non-interference in constructive authorization logic
D Garg, F Pfenning
Computer Security Foundations Workshop, 2006. 19th IEEE, 11 pp.-296
, 2006
121
2006
Information flow control in WebKit’s JavaScript bytecode
A Bichhawat, V Rajani, D Garg, C Hammer
Principles of Security and Trust: Third International Conference, POST 2014 …
, 2014
114
2014
RefinedC: automating the foundational verification of C code with refined ownership types
M Sammler, R Lepigre, R Krebbers, K Memarian, D Dreyer, D Garg
Proceedings of the 42nd ACM SIGPLAN International Conference on Programming …
, 2021
100
2021
Relational cost analysis.
E Çiçek, G Barthe, M Gaboardi, D Garg, J Hoffmann
POPL 17, 316-329
, 2017
98
2017
Journey beyond full abstraction: Exploring robust property preservation for secure compilation
C Abate, R Blanco, D Garg, C Hritcu, M Patrignani, J Thibault
2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 256-25615
, 2019
91
2019
A modal deconstruction of access control logics
D Garg, M Abadi
International Conference on Foundations of Software Science and …
, 2008
90
2008
A linear logic of authorization and knowledge
D Garg, L Bauer, K Bowers, F Pfenning, M Reiter
Computer Security–ESORICS 2006, 297-312
, 2006
88
2006
A relational logic for higher-order programs
A Aguirre, G Barthe, M Gaboardi, D Garg, PY Strub
Journal of Functional Programming 29
, 2019
70
2019
Robust and compositional verification of object capability patterns
D Swasey, D Garg, D Dreyer
Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-26
, 2017
68
*
2017
A proof-carrying file system
D Garg, F Pfenning
Security and Privacy (SP), 2010 IEEE Symposium on, 349-364
, 2010
60
2010
Qapla: Policy compliance for database-backed systems
A Mehta, E Elnikety, K Harvey, D Garg, P Druschel
26th USENIX Security Symposium (USENIX Security 17), 1463-1479
, 2017
56
2017
Secure compilation and hyperproperty preservation
M Patrignani, D Garg
2017 IEEE 30th Computer Security Foundations Symposium (CSF), 392-404
, 2017
53
2017
Robustly safe compilation, an efficient form of secure compilation
M Patrignani, D Garg
ACM Transactions on Programming Languages and Systems (TOPLAS) 43 (1), 1-41
, 2021
51
*
2021
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms⋆
A Datta, J Blocki, N Christin, H DeYoung, D Garg, L Jia, D Kaynar, ...
51
2011
The system can't perform the operation now. Try again later.
Articles 1–20
Show more
Privacy
Terms
Help
About Scholar
Search help