Two can keep A secret: A distributed architecture for secure database services, CIDR, pp.186-199, 2005. ,
Can programming be liberated from the von Neumann style?: a functional style and its algebra of programs, Communications of the ACM, vol.21, issue.8, pp.613-641, 1978. ,
DOI : 10.1145/359576.359579
Functional Programming in Scala, 2014. ,
A software-hardware architecture for self-protecting data, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.14-27, 2012. ,
DOI : 10.1145/2382196.2382201
Type classes as objects and implicits, Proceedings of the 25th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2010, pp.341-360, 2010. ,
Encryption and Fragmentation for Data Confidentiality in the Cloud, Foundations of Security Analysis and Design VII - FOSAD 2012/2013 Tutorial Lectures, pp.212-243, 2013. ,
DOI : 10.1007/978-3-319-06320-1_4
Zql: A compiler for privacy-preserving data processing, USENIX Security, pp.163-178, 2013. ,
Using self-defending objects to develop security aware applications in java, ACSC, pp.341-349, 2004. ,
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data, Privacy Enhancing Technologies, pp.69-84, 2002. ,
DOI : 10.1007/3-540-36467-6_6
ScalaCheck: Property-based testing for Scala, 2007. ,
Can homomorphic encryption be practical?, Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, pp.113-124, 2011. ,
DOI : 10.1145/2046660.2046682
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.225.8007
Programming in scala, Artima Inc, 2008. ,
Sticky Policies: An Approach for Managing Privacy across Multiple Parties, Computer, vol.44, issue.9, pp.60-68, 2011. ,
DOI : 10.1109/MC.2011.225
Distance makes the types grow stronger: a calculus for differential privacy, ICFP, pp.157-168, 2010. ,
Data privacy and security: encryption and information hiding, 2003. ,
DOI : 10.1007/978-0-387-21707-9
MrCrypt: static analysis for secure cloud computations, Proceedings of the 2013 ACM SIG- PLAN international conference on Object oriented programming systems languages & applications OOPSLA, pp.271-286, 2013. ,
Information accountability, Commun. ACM, vol.51, issue.6, pp.82-87, 2008. ,
Comprehending monads, Proceedings of the 1990 ACM conference on LISP and functional programming , LFP '90, pp.461-493, 1992. ,
DOI : 10.1145/91556.91592
The essence of functional programming, Proceedings of the 19th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '92, pp.1-14, 1992. ,
DOI : 10.1145/143165.143169
A Systematic Survey of Self-Protecting Software Systems, ACM Transactions on Autonomous and Adaptive Systems, vol.8, issue.4, p.17, 2014. ,
DOI : 10.1145/2555611