@conference {inp:BichhawatRajaniGargHammer2014b, title = {Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis}, booktitle = {Proceedings of the 9th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2014)}, year = {2014}, author = {A. Bichhawat and V. Rajani and D. Garg and C. Hammer} } @conference {inp:FennellThiemann2014, title = {Gradual Typing for Annotated Type Systems}, booktitle = {Proceedings of the 23rd European Symposium on Programming (ESOP 2014)}, year = {2014}, author = {L. Fennell and P. Thiemann} } @conference {inp:FennellThiemann2013, title = {Gradual Security Typing with References}, booktitle = {Proceedings of the 26th IEEE Computer Security Foundations Symposium (CSF 2013)}, year = {2013}, pages = {224-239}, keywords = {conference}, author = {L. Fennell and P. Thiemann} } @article {art:KuestersTruderungVogt2012, title = {A Game-Based Definition of Coercion-Resistance and its Applications}, journal = {Journal of Computer Security (special issue of selected CSF 2010 papers)}, volume = {20}, number = {6/2012}, year = {2012}, author = {R. K{\"u}sters and T. Truderung and A. Vogt} }