Andrew C. Myers
#151,487
Most Influential Person Now
Professor in the Department of Computer Science at Cornell University in Ithaca, NY
Andrew C. Myers's AcademicInfluence.com Rankings
Andrew C. Myerscomputer-science Degrees
Computer Science
#8008
World Rank
#8426
Historical Rank
#1701
USA Rank
Database
#5056
World Rank
#5253
Historical Rank
#742
USA Rank

Download Badge
Computer Science
Why Is Andrew C. Myers Influential?
(Suggest an Edit or Addition)Andrew C. Myers's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Language-based information-flow security (2003) (2100)
- JFlow: practical mostly-static information flow control (1999) (1211)
- Protecting privacy using the decentralized label model (2000) (629)
- A decentralized model for information flow control (1997) (625)
- Polyglot: An Extensible Compiler Framework for Java (2003) (460)
- Civitas: Toward a Secure Voting System (2008) (390)
- Jif: java information flow (1999) (289)
- Secure web applications via automatic partitioning (2007) (273)
- Observational determinism for concurrent program security (2003) (267)
- Parameterized types for Java (1997) (256)
- Robust declassification (2001) (242)
- A Model for Delimited Information Release (2003) (220)
- Complete, safe information flow with decentralized labels (1998) (206)
- A Hardware Design Language for Timing-Sensitive Information-Flow Security (2015) (199)
- Mutations in DDX3X Are a Common Cause of Unexplained Intellectual Disability with Gender-Specific Effects on Wnt Signaling. (2015) (187)
- SIF: Enforcing Confidentiality and Integrity in Web Applications (2007) (184)
- Predictive black-box mitigation of timing channels (2010) (178)
- Secure program partitioning (2002) (178)
- Fabric: a platform for secure distributed computation and storage (2009) (167)
- Scalable extensibility via nested inheritance (2004) (163)
- Safe and efficient sharing of persistent objects in Thor (1996) (160)
- Security policies for downgrading (2004) (150)
- Belief in information flow (2005) (142)
- Language-based control and mitigation of timing channels (2012) (140)
- Enforcing robust declassification (2004) (128)
- Predictive mitigation of timing channels in interactive systems (2011) (123)
- Untrusted hosts and confidentiality: secure program partitioning (2001) (123)
- Enforcing Robust Declassification and Qualified Robustness (2006) (120)
- Using replication and partitioning to build secure distributed systems (2003) (116)
- Dynamic security labels and static information flow control (2007) (115)
- Subtypes vs. where clauses: constraining parametric polymorphism (1995) (112)
- Quantifying information flow with beliefs (2009) (107)
- J&: nested intersection for scalable software composition (2006) (105)
- Lattice priority scheduling: Low-overhead timing-channel protection for a shared memory controller (2014) (101)
- Mostly-static decentralized information flow control (1999) (97)
- SecDCP: Secure dynamic cache partitioning for efficient timing channel protection (2016) (95)
- Global Environment for Network Innovations (2005) (95)
- Dynamic Security Labels and Noninterference (2004) (84)
- Secure Information Flow via Linear Continuations (2002) (79)
- Secure Information Flow and CPS (2001) (79)
- Automatic Partitioning of Database Applications (2012) (76)
- Perinatal features of the RASopathies: Noonan syndrome, Cardiofaciocutaneous syndrome and Costello syndrome (2014) (75)
- Language-based information erasure (2005) (74)
- Masked types for sound object initialization (2009) (73)
- Calcium channel blocker toxicity. (1990) (73)
- HAC: hybrid adaptive caching for distributed storage systems (1997) (73)
- Whole-Exome Sequencing in the molecular diagnosis of individuals with congenital anomalies of kidney and urinary tract and identification of a new causative gene (2016) (71)
- Decentralized robustness (2006) (69)
- JMatch: Iterable Abstract Pattern Matching for Java (2003) (63)
- Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016) (62)
- Sharing Mobile Code Securely with Information Flow Control (2012) (62)
- Verification of a Practical Hardware Security Architecture Through Static Information Flow Analysis (2017) (60)
- End-to-End Enforcement of Erasure and Declassification (2008) (56)
- A Semantic Framework for Declassification and Endorsement (2010) (50)
- End-to-end availability policies and noninterference (2005) (47)
- Toward general diagnosis of static errors (2014) (47)
- HyperFlow: A Processor Architecture for Nonmalleable, Timing-Safe Information Flow Security (2018) (46)
- Teaching Programming with Gamified Semantics (2017) (43)
- Bidirectional object layout for separate compilation (1995) (41)
- MixT: a language for mixing consistency in geodistributed transactions (2018) (41)
- Civitas: A Secure Voting System (2007) (39)
- Abstraction-safe effect handlers via tunneling (2019) (39)
- Loss-of-Function Mutations in FRRS1L Lead to an Epileptic-Dyskinetic Encephalopathy. (2016) (37)
- Building secure web applications with automatic partitioning (2009) (37)
- Fabric: Building open distributed systems securely by construction (2017) (36)
- References to remote mobile objects in Thor (1993) (36)
- Flow-Limited Authorization (2015) (35)
- Parameterized Types and Java (1996) (35)
- Nonmalleable Information Flow Control (2017) (33)
- Warranties for Faster Strong Consistency (2014) (33)
- Dynamic Security Labels and Noninterference (Extended Abstract) (2004) (31)
- StatusQuo: Making Familiar Abstractions Perform Using Program Analysis (2013) (31)
- Attacker Control and Impact for Confidentiality and Integrity (2011) (31)
- Civitas: A Secure Remote Voting System (2007) (31)
- Diagnosing type errors with class (2015) (31)
- Trickles: a stateless network stack for improved scalability, resilience, and flexibility (2005) (30)
- Supporting workflow in a course management system (2005) (29)
- Report on the NSF Workshop on Formal Methods for Security (2016) (28)
- Interruptible iterators (2006) (26)
- Using Program Analysis to Improve Database Applications (2014) (26)
- Genetic markers of male infertility: Y chromosome microdeletions and cystic fibrosis transmembrane conductance gene mutations. (2001) (25)
- Coercion-Resistant Remote Voting using Decryption Mixes (2005) (25)
- Homozygous GNAL mutation associated with familial childhood-onset generalized dystonia (2016) (24)
- A Calculus for Flow-Limited Authorization (2016) (23)
- Lightweight, flexible object-oriented generics (2015) (23)
- Nonsense pathogenic variants in exon 1 of PHOX2B lead to translational reinitiation in congenital central hypoventilation syndrome (2017) (21)
- Stealthy Tracking of Autonomous Vehicles with Cache Side Channels (2020) (20)
- Nonreentrant atrial tachycardia occurs independently of hypertrophic cardiomyopathy in RASopathy patients (2018) (20)
- Secure information flow verification with mutable dependent types (2017) (19)
- Accepting blame for safe tunneled exceptions (2016) (19)
- Development and evaluation of a PCR-based, line probe assay for the detection of 58 alleles in the cystic fibrosis transmembrane conductance regulator (CFTR) gene. (2002) (18)
- FOXP1 haploinsufficiency: Phenotypes beyond behavior and intellectual disability? (2017) (18)
- Using Information Flow to Design an ISA that Controls Timing Channels (2019) (18)
- Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (2018) (17)
- A Tour of Gallifrey, a Language for Geodistributed Programming (2019) (15)
- Mutation in GM2A Leads to a Progressive Chorea-dementia Syndrome (2015) (14)
- A stateless approach to connection-oriented protocols (2008) (14)
- Sharing classes between families (2009) (14)
- Increased body mass in infancy and early toddlerhood in Angelman syndrome patients with uniparental disomy and imprinting center defects (2015) (13)
- Compositional Security for Reentrant Applications (2021) (13)
- JRIF: Reactive Information Flow Control for Java (2016) (11)
- Report of the NSF Workshop on Research Challenges in Distributed Computer Systems (2005) (10)
- JMatch: Java plus Pattern Matching (2002) (10)
- Rare Genetic Variants in Immune Genes and Neonatal Herpes Simplex Viral Infections (2020) (9)
- A Language-Based Approach to Secure Quorum Replication (2014) (9)
- The Language-Independent Interface of the Thor Persistent Object System (1995) (9)
- Survey of CF mutations in the clinical laboratory (2002) (9)
- Respiratory system involvement in Costello syndrome (2016) (9)
- Defining and Enforcing Referential Security (2014) (9)
- Finding counterexamples from parsing conflicts (2015) (9)
- Reconciling exhaustive pattern matching with objects (2013) (9)
- Full-Processor Timing Channel Protection with Applications to Secure Hardware Compartments (2017) (8)
- SHErrLoc: A Static Holistic Error Locator (2017) (8)
- Familia: unifying interfaces, type classes, and family polymorphism (2017) (8)
- Securing nonintrusive web encryption through information flow (2008) (7)
- Efficient, Consistent Distributed Computation with Predictive Treaties (2019) (7)
- Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency (2016) (7)
- Viaduct: an extensible, optimizing compiler for secure distributed programs (2021) (7)
- Distributed Protocols and Heterogeneous Trust: Technical Report (2014) (7)
- Securing Smart Contracts with Information Flow (2020) (7)
- Speeding up database applications with Pyxis (2013) (6)
- A Hardware Design Language for Efficient Control of Timing Channels (2014) (6)
- Confidentiality and Integrity with Untrusted Hosts (2000) (6)
- Language-Based Security for Malicious Mobile Code (2007) (6)
- Flow-Limited Authorization : Technical Report (2015) (6)
- Nested Intersection for Scalable Software Composition (Technical Report) (2006) (5)
- Resolving the integrity/performance conflict (1993) (5)
- A Calculus for Flow-Limited Authorization: Technical Report (2016) (5)
- Homogeneous family sharing (2010) (5)
- Fast Object Operations in a Persistent Programming System (1994) (4)
- Secure Autonomous Cyber-Physical Systems Through Verifiable Information Flow Control (2018) (4)
- Diagnosing Haskell Type Errors (2015) (4)
- Programming with Explicit Security Policies (2005) (4)
- Lightweight Verification of Secure Hardware Isolation Through Static Information Flow Analysis (Technical Report) (2017) (4)
- Handling bidirectional control flow (2020) (3)
- Genus: Making Generics Object-Oriented, Expressive, and Lightweight (2015) (3)
- Heterogeneous Paxos (2020) (3)
- Principles of Security and Trust: 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (2015) (3)
- Making Distributed Computation Trustworthy by Construction (2006) (3)
- Building a Bridge Between Genetics and Outcomes Research: Application in Autism (The AutGO Study) (2018) (3)
- Accepting Blame: Expressive Checked Exceptions (2016) (3)
- An Extensible, Optimizing Compiler for Secure Distributed Programs (Technical Report) (2021) (2)
- The Cost of Software-Based Memory Management Without Virtual Memory (2020) (2)
- Protecting privacy in a decentralized environment (2000) (2)
- Mixing Consistency in Geodistributed Transactions: Technical Report (2016) (2)
- Confidentiality and Integrity with Untrusted Hosts: Technical Report (2000) (2)
- Videos of demo of self-driving robot with map verification (2017) (2)
- A Web of Blocks (2018) (2)
- Expressing Information Flow Properties (2022) (2)
- Charlotte: Composable Authenticated Distributed Data Structures, Technical Report (2019) (2)
- Language Mechanisms for Controlling and Mitigating Timing Channels (2012) (1)
- Bowen-Conradi Syndrome: a trisomy 18-like autosomal recessive disorder common in Hutterites. (2015) (1)
- Mutations in the AMPA receptor complex protein FRRS1L cause an inherited Huntington-like chorea-dementia syndrome (2015) (1)
- Toward General Diagnosis of Static Errors: Technical Report (2013) (1)
- Sharing Classes Between Families : Technical report (2009) (1)
- A Language for Securely Referencing Persistent Information in a Federated System (2014) (1)
- SHErrLoc (2017) (1)
- Nonmalleable Information Flow: Technical Report (2017) (1)
- Accountable Information Flow for Java-Based Web Applications (2010) (1)
- Software Composition with Multiple Nested Inheritance (2006) (1)
- Replication Package for Viaduct: An Extensible, Optimizing Compiler for Secure Distributed Programs (2021) (1)
- Handling Bidirectional Control Flow: Technical Report (2020) (1)
- End-to-End Availability Policies and Noninterference Lantian (2005) (1)
- A flexible type system for fearless concurrency (2022) (1)
- Dynamic Security Labels and Noninterference Lantian (2004) (1)
- A Calculus for Flow-Limited Authorization Corrected version : August 30 th , 2017 ∗ (2017) (1)
- Homogeneous Family Sharing : Technical report (2010) (1)
- HyperFlow: A Processor Architecture for Timing-Safe Information-Flow Security (2018) (1)
- Path Planning Under Malicious Injections and Removals of Perceived Obstacles: A Probabilistic Programming Approach (2020) (1)
- Reconciling Exhaustive Pattern Matching with Objects : Technical Report Chinawat Isradisaikul (2013) (1)
- Verification of a practical hardware security architecture (2016) (1)
- Overview of PolyJ (1999) (1)
- Technical perspectiveReframing security for the web (2009) (0)
- 07091 Executive Summary - Mobility, Ubiquity and Security (2007) (0)
- JRIF : Reactive Information Flow Control for Java ∗ Technical Report (2015) (0)
- Session details: Language Design & Implementation Issues (2002) (0)
- Composition with Multiple Nested Inheritance (2006) (0)
- PDL: a high-level hardware design language for pipelined processors (2022) (0)
- Civitas: Toward a Secure Voting System The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters (2008) (0)
- Guiding Distributed Systems Synthesis with Language-Based Security Policies (2008) (0)
- Security Engineering for High Assurance, Policy-Based Applications (2002) (0)
- ALSO: A Language for Extensible Multi-user Systems (1996) (0)
- Appendix to A Flexible Type System for Fearless Concurrency (2022) (0)
- Proceedings of the 4th International Conference on Principles of Security and Trust - Volume 9036 (2015) (0)
- Appendix to A Flexible Type System for Fearless Concurrency (2022) (0)
- Foreword (2017) (0)
- CS 6113 Lecture 19 Quantitative Information Flow 12 November 2013 (2013) (0)
- Secure Typed Programming Languages Communication (2019) (0)
- Errata slip (1988) (0)
- Abstraction Mechanisms in Theta (2013) (0)
- Masked Types : Technical report (2008) (0)
- CS 611 Lecture 30 Recursive Types November 6 , 2000 (2000) (0)
- 36 A Monadic Approach to Abstract Interpretation 22 April 2013 (2013) (0)
- CS 4120 Lecture 37 Memory Management 28 November 2011 Lecturer : (2011) (0)
- Editor's Foreword to “Static Backward Slicing of Non-Deterministic Programs and Systems” (2018) (0)
- Using Security Policies to Write Secure Software (2010) (0)
- CS 611 Lecture 33 Equirecursive types & Recursive domain equations November 19 , 2001 (0)
- CS 2112 Lecture 27 Interpreters , compilers , and the Java Virtual Machine 1 May 2012 (2012) (0)
- Mobility, Ubiquity and Security, 25.02. - 02.03.2007 (2007) (0)
- Heterogeneous Paxos: Technical Report (2020) (0)
- IMPORTANT FACTORS IN CLINICAL DECISION MAKING FOR RAPID STREPTOCOCCAL ANTIGEN TESTING: A SURVEY OF PEDIATRIC EMERGENCY DEPARTMENT (ED) PROVIDERS (2015) (0)
- Resolving the IntegrityPerformance Conflict (1993) (0)
- Containment and Integrity for Mobile Code (2004) (0)
- A Hutterite condition that mimics Bowen-Conradi syndrome. (2015) (0)
- 2 Cheating in a sealed-bid auction (2017) (0)
- AWeb of Blocks Technical Report (2018) (0)
- Security-Typed Languages and Distributed Computation (2001) (0)
- Executive Summary and Abstracts Collection of Seminar 0709: Mobility, Ubiquity, and Security (2007) (0)
- CS 611 Lecture 7 Inductive Definitions and Fixed Points 7 September 2007 Lecturer : Andrew Myers 1 Set operators (2007) (0)
- Toward Securely Programming the Internet (2010) (0)
- Integrating End-to-end Security and Fault Tolerance (2004) (0)
- Abstraction-Safe Effect Handlers via Tunneling 5 : 3 (2018) (0)
- Dynamic Security Labels and Noninterference Lantian Zheng (2004) (0)
- Session details: Language Design & Implementation Issues (2002) (0)
- How languages can save distributed computing (2013) (0)
- Coarray Fortran in CENTORI and a Sparse Matrix Multiplier Code (2010) (0)
- Making distributed systems secure with program analysis and transformation (2005) (0)
- 07091 Abstracts Collection - Mobility, Ubiquity and Security (2007) (0)
- Compositional Security for Reentrant Applications (Technical Report) (2021) (0)
This paper list is powered by the following services:
Other Resources About Andrew C. Myers
What Schools Are Affiliated With Andrew C. Myers?
Andrew C. Myers is affiliated with the following schools: