| Deny capabilities for safe, fast actors S Clebsch, S Drossopoulou, S Blessing, A McNeil Proceedings of the 5th International Workshop on Programming Based on Actors …, 2015 | 161 | 2015 |
| CCF: A framework for building confidential verifiable replicated services M Russinovich, E Ashton, C Avanessians, M Castro, A Chamayou, ... Microsoft, Redmond, WA, USA, Tech. Rep. MSR-TR-2019-16, 2019 | 102 | 2019 |
| Toward confidential cloud computing M Russinovich, M Costa, C Fournet, D Chisnall, A Delignat-Lavaud, ... Communications of the ACM 64 (6), 54-61, 2021 | 60 | 2021 |
| Fully concurrent garbage collection of actors on many-core machines S Clebsch, S Drossopoulou Proceedings of the 2013 ACM SIGPLAN international conference on Object …, 2013 | 46 | 2013 |
| Orca: GC and type system co-design for actor languages S Clebsch, J Franco, S Drossopoulou, AM Yang, T Wrigstad, J Vitek Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-28, 2017 | 39 | 2017 |
| {IA-CCF}: Individual accountability for permissioned ledgers A Shamis, P Pietzuch, B Canakci, M Castro, C Fournet, E Ashton, ... 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2022 | 38 | 2022 |
| Snmalloc: a message passing allocator P Liétar, T Butler, S Clebsch, S Drossopoulou, J Franco, MJ Parkinson, ... Proceedings of the 2019 ACM SIGPLAN International Symposium on Memory …, 2019 | 35 | 2019 |
| Confidential consortium framework: Secure multiparty applications with confidentiality, integrity, and high availability H Howard, F Alder, E Ashton, A Chamayou, S Clebsch, M Costa, ... arXiv preprint arXiv:2310.11559, 2023 | 29 | 2023 |
| AMP: Authentication of media via provenance P England, HS Malvar, E Horvitz, JW Stokes, C Fournet, R Burke-Aguero, ... Proceedings of the 12th ACM Multimedia Systems Conference, 108-121, 2021 | 23 | 2021 |
| Multi-stakeholder media provenance management to counter synthetic media risks in news publishing J Aythora, R Burke-Agüero, A Chamayou, S Clebsch, M Costa, ... Proc. Intl. Broadcasting Convention (IBC) 1 (2), 8, 2020 | 23 | 2020 |
| Reference capabilities for flexible memory management E Arvidsson, E Castegren, S Clebsch, S Drossopoulou, J Noble, ... Proceedings of the ACM on Programming Languages 7 (OOPSLA2), 1363-1393, 2023 | 20 | 2023 |
| 'Pony': co-designing a type system and a runtime. S Clebsch Imperial College London, UK, 2017 | 16 | 2017 |
| Why should I trust your code? A Delignat-Lavaud, C Fournet, K Vaswani, S Clebsch, M Riechert, ... Communications of the ACM 67 (1), 68-76, 2023 | 15 | 2023 |
| Toward confidential cloud computing: Extending hardware-enforced cryptographic protection to data while in use M Russinovich, M Costa, C Fournet, D Chisnall, A Delignat-Lavaud, ... Queue 19 (1), 49-76, 2021 | 14 | 2021 |
| Tree topologies for causal message delivery S Blessing, S Clebsch, S Drossopoulou Proceedings of the 7th ACM SIGPLAN International Workshop on Programming …, 2017 | 14 | 2017 |
| Ownership and reference counting based garbage collection in the actor world S Clebsch, S Blessing, J Franco, S Drossopoulou ICOOOLPS’2015, 2015 | 12 | 2015 |
| When Concurrency Matters: Behaviour-Oriented Concurrency L Cheeseman, MJ Parkinson, S Clebsch, M Kogias, S Drossopoulou, ... Proceedings of the ACM on Programming Languages 7 (OOPSLA2), 1531-1560, 2023 | 11 | 2023 |
| Why Should I Trust Your Code? Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy. A Delignat-Lavaud, C Fournet, K Vaswani, S Clebsch, M Riechert, ... Queue 21 (4), 94-122, 2023 | 11 | 2023 |
| Package processing SW CLEBSCH, MMJ BROCKSCHMIDT, SS Ishtiaq, JEC ALGLAVE, ... US Patent 10,592,661, 2020 | 11 | 2020 |
| Confidential Container Groups: Implementing confidential computing on Azure container instances MA Johnson, S Volos, K Gordon, ST Allen, CM Wintersteiger, S Clebsch, ... Queue 22 (2), 57-86, 2024 | 9 | 2024 |