Journal Article FSR: Formal Analysis and Implementation Toolkit for Safe Inter-domain Routing 2011 • Computer Communication Review • 41(4):440-441 Ren Y, Zhou W, Wang A, Jia L, Gurney AJT, Loo BT, Rexford J
Conference Maintaining Distributed Logic Programs Incrementally 2011 • PPDP 11 - PROCEEDINGS OF THE 2011 SYMPOSIUM ON PRINCIPLES AND PRACTICES OF DECLARATIVE PROGRAMMING • 125-136 Nigam V, Jia L, Loo BT, Scedrov A
Journal Article Modeling and Enhancing Android’s Permission System (CMU-CyLab-11-020) 2011 Fragkaki E, Bauer L, Jia L, Swasey D
Journal Article On Adversary Models and Compositional Security 2011 • IEEE Security and Privacy • 9(3):26-32 Datta A, Franklin J, Garg D, Jia L, Kaynar D
Conference Policy Auditing over Incomplete Logs: Theory, Implementation and Applications 2011 • Proceedings of the ACM Conference on Computer and Communications Security • 151-162 Garg D, Jia L, Datta A
Conference Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms 2011 • Lecture Notes in Computer Science • 7093:1-+ Datta A, Blocki J, Christin N, DeYoung H, Garg D, Jia L, Kaynar D, Sinha A
Conference Constraining Credential Usage in Logic-Based Access Control 2010 • Proceedings - IEEE Computer Security Foundations Symposium • 154-168 Bauer L, Jia L, Sharma D
Conference Dependent Types and Program Equivalence 2010 • Conference Record of the Annual ACM Symposium on Principles of Programming Languages • 275-286 Jia L, Zhao J, Sjoeberg V, Weirich S
Conference Dependent Types and Program Equivalence 2010 • ACM Sigplan Notices • 45(1):275-286 Jia L, Zhao J, Sjoberg V, Weirich S
Conference Experiences in the logical specification of the HIPAA and GLBA privacy laws 2010 • Proceedings of the ACM Conference on Computer and Communications Security • 73-82 DeYoung H, Garg D, Jia L, Kaynar D, Datta A
Journal Article Privacy Policy Specification and Audit in a Fixed-Point Logic - How to Enforce HIPAA, GLBA and All That 2010 DeYoung H, Garg D, Jia L, Kaynar D, Datta A
Journal Article Privacy Policy Specification and Audit in a Fixed-Point Logic - How to enforce HIPAA, GLBA and all that (CMU-CyLab-10-008) 2010 DeYoung H, Garg D, Jia L, Kaynar D, Datta A
Conference Encoding information flow in AURA 2009 • ACM Sigplan Notices • 44(8):7-19 Jia L, Zdancewic S
Journal Article Encoding information flow in AURA (abstract only) 2009 • ACM Sigplan Notices • 44(8):4-4 Jia L, Zdancewic S
Conference Language Support for Processing Distributed Ad Hoc Data 2009 • PPDP'09: PROCEEDINGS OF THE 11TH INTERNATIONAL ACM SIGPLAN SYMPOSIUM ON PRINCIPLES AND PRACTICE OF DECLARATIVE PROGRAMMING • 243-254 Zhu KQ, Dantas DS, Fisher K, Jia L, Mandelbaum Y, Pai V, Walker D
Conference xDomain: Cross-border Proofs of Access 2009 • SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES • 43-52 Bauer L, Jia L, Reiter MK, Swasey D
Journal Article AURA 2008 • ACM Sigplan Notices • 27-38 Jia L, Vaughan JA, Mazurak K, Zhao J, Zarko L, Schorr J, Zdancewic S
Conference AURA: A programming language for authorization and audit 2008 • Proceedings of the ACM SIGPLAN International Conference on Functional Programming, ICFP • 27-38 Jia L, Vaughan JA, Mazurak K, Zhao J, Zarko L, Schorr J, Zdancewic S
Journal Article AURA: a programming language for authorization and audit 2008 • ACM Sigplan Notices • 43(9):27-38 Jia L, Vaughan JA, Mazurak K, Zhao J, Zarko L, Schorr J, Zdancewic S
Conference Evidence-based audit 2008 • Proceedings - IEEE Computer Security Foundations Symposium • 177-191 Vaughan JA, Jia L, Mazurak K, Zdancewic S
Conference ILC: A foundation for automated reasoning about pointer programs 2006 • Lecture Notes in Computer Science • 3924:131-145 Jia LM, Walker D
Conference Certifying compilation for a language with stack allocation 2005 • Proceedings - Symposium on Logic in Computer Science • 407-416 Jia LM, Spalding F, Walker D, Glew N
Chapter Modal proofs as distributed programs 2004 • Lecture Notes in Computer Science • 2986:219-233 Jia LM, Walker D