Conference Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms 2011 • Lecture Notes in Computer Science • 7093:1-+ Datta A, Blocki J, Christin N, DeYoung H, Garg D, Jia L, Kaynar D, Sinha A
Conference Constraining Credential Usage in Logic-Based Access Control 2010 • Proceedings - IEEE Computer Security Foundations Symposium • 154-168 Bauer L, Jia L, Sharma D
Conference Dependent Types and Program Equivalence 2010 • ACM Sigplan Notices • 45(1):275-286 Jia L, Zhao J, Sjoberg V, Weirich S
Conference Dependent Types and Program Equivalence 2010 • Conference Record of the Annual ACM Symposium on Principles of Programming Languages • 275-286 Jia L, Zhao J, Sjoeberg V, Weirich S
Conference Experiences in the logical specification of the HIPAA and GLBA privacy laws 2010 • Proceedings of the ACM Conference on Computer and Communications Security • 73-82 DeYoung H, Garg D, Jia L, Kaynar D, Datta A
Journal Article Privacy Policy Specification and Audit in a Fixed-Point Logic - How to Enforce HIPAA, GLBA and All That 2010 DeYoung H, Garg D, Jia L, Kaynar D, Datta A
Conference Encoding information flow in AURA 2009 • PLAS'09 - Proceedings of the ACM SIGPLAN 4th Workshop on Programming Languages and Analysis for Security • 17-29 Jia L, Zdancewic S
Conference Encoding information flow in AURA 2009 • ACM Sigplan Notices • 44(8):7-19 Jia L, Zdancewic S
Journal Article Encoding information flow in AURA (abstract only) 2009 • ACM Sigplan Notices • 44(8):4-4 Jia L, Zdancewic S
Conference Language Support for Processing Distributed Ad Hoc Data 2009 • PPDP'09: PROCEEDINGS OF THE 11TH INTERNATIONAL ACM SIGPLAN SYMPOSIUM ON PRINCIPLES AND PRACTICE OF DECLARATIVE PROGRAMMING • 243-254 Zhu KQ, Dantas DS, Fisher K, Jia L, Mandelbaum Y, Pai V, Walker D
Conference xDomain: Cross-border Proofs of Access 2009 • SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES • 43-52 Bauer L, Jia L, Reiter MK, Swasey D
Journal Article AURA: a programming language for authorization and audit 2008 • ACM Sigplan Notices • 43(9):27-38 Jia L, Vaughan JA, Mazurak K, Zhao J, Zarko L, Schorr J, Zdancewic S
Journal Article AURA: A programming language for authorization and audit 2008 • ACM Sigplan Notices • 43(9):27-38 Jia L, Vaughan JA, Mazurak K, Zhao J, Zarko L, Schorr J, Zdancewic S
Conference AURA: A programming language for authorization and audit 2008 • Proceedings of the ACM SIGPLAN International Conference on Functional Programming, ICFP • 27-38 Jia L, Vaughan JA, Mazurak K, Zhao J, Zarko L, Schorr J, Zdancewic S
Conference Evidence-based audit 2008 • Proceedings - IEEE Computer Security Foundations Symposium • 177-191 Vaughan JA, Jia L, Mazurak K, Zdancewic S
Conference Expressing heap-shape contracts in linear logic 2006 • Proceedings of the 5th International Conference on Generative Programming and Component Engineering, GPCE'06 • 101-110 Perry F, Jia L, Walker D
Conference ILC: A foundation for automated reasoning about pointer programs 2006 • Lecture Notes in Computer Science • 3924:131-145 Jia LM, Walker D
Conference Certifying compilation for a language with stack allocation 2005 • Proceedings - Symposium on Logic in Computer Science • 407-416 Jia LM, Spalding F, Walker D, Glew N
Chapter Modal proofs as distributed programs 2004 • Lecture Notes in Computer Science • 2986:219-233 Jia LM, Walker D
Conference Reasoning about hierarchical storage 2003 • Proceedings - Symposium on Logic in Computer Science • 33-44 Ahmed A, Jia LM, Walker D