Scott Stoller
Affiliations: | Computer Science | Stony Brook University, Stony Brook, NY, United States |
Area:
Distributed Systems, Fault-tolerance and Security, Software Testing and Verification, Program Analysis and Optimization.Google:
"Scott Stoller"Children
Sign in to add traineeRahul Agarwal | grad student | 2006 | SUNY Stony Brook |
Liqiang Wang | grad student | 2006 | SUNY Stony Brook |
Leena Unnikrishnan | grad student | 2008 | SUNY Stony Brook |
Zhongyuan Xu | grad student | 2014 | SUNY Stony Brook |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Yang P, Gofman MI, Stoller SD, et al. (2015) Policy analysis for administrative role based access control without separate administration Journal of Computer Security. 23: 1-29 |
Xu Z, Stoller SD. (2015) Mining Attribute-Based Access Control Policies Ieee Transactions On Dependable and Secure Computing. 12: 533-545 |
Gupta P, Stoller SD, Xu Z. (2014) Abductive Analysis of Administrative Policies in Rule-Based Access Control Ieee Transactions On Dependable and Secure Computing. 11: 412-424 |
Xu Z, Stoller SD. (2013) Mining parameterized role-based policies Codaspy 2013 - Proceedings of the 3rd Acm Conference On Data and Application Security and Privacy. 255-265 |
Liu YA, Stoller SD, Lin B, et al. (2012) From clarity to efficiency for distributed algorithms ? Proceedings of the Conference On Object-Oriented Programming Systems, Languages, and Applications, Oopsla. 395-409 |
Xu Z, Stoller SD. (2012) Algorithms for mining meaningful roles Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 57-66 |
Liu YA, Stoller SD, Lin B. (2012) High-level executable specifications of distributed algorithms Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7596: 95-110 |
Stoller SD, Yang P, Gofman MI, et al. (2011) Symbolic reachability analysis for parameterized administrative role-based access control Computers and Security. 30: 148-164 |
Agarwal R, Bensalem S, Farchi E, et al. (2010) Detection of deadlock potentials in multithreaded programs Ibm Journal of Research and Development. 54 |
Gorbovitski M, Liu YA, Stoller SD, et al. (2010) Alias analysis for optimization of dynamic languages Proceedings of the 6th Symposium On Dynamic Languages, Dls '10. 27-41 |