Henry DeYoung
Carnegie Mellon University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Henry DeYoung.
workshop on privacy in the electronic society | 2010
Henry DeYoung; Deepak Garg; Limin Jia; Dilsun Kirli Kaynar; Anupam Datta
Despite the wide array of frameworks proposed for the formal specification and analysis of privacy laws, there has been comparatively little work on expressing large fragments of actual privacy laws in these frameworks. We attempt to bridge this gap by giving complete logical formalizations of the transmission-related portions of the Health Insurance Portability and Accountability Act (HIPAA) and the Gramm-Leach-Bliley Act (GLBA). To this end, we develop the PrivacyLFP logic, whose features include support for disclosure purposes, real-time constructs, and self-reference via fixed points. To illustrate these features and demonstrate PrivacyLFPs utility, we present formalizations of a collection of clauses from these laws. Due to their size, our full formalizations of HIPAA and GLBA appear in a companion technical report. We discuss ambiguities in the laws that our formalizations revealed and sketch preliminary ideas for computer-assisted enforcement of such privacy policies.
ieee computer security foundations symposium | 2008
Henry DeYoung; Deepak Garg; Frank Pfenning
We present an authorization logic that permits reasoning with explicit time. Following a proof-theoretic approach, we study the meta-theory of the logic, including cut elimination. We also demonstrate formal connections to proof-carrying authorizations existing approach for handling time and comment on the enforceability of our logic in the same framework. Finally, we illustrate the expressiveness of the logic through examples, including those with complex interactions between time, authorization, and mutable state.
computer science logic | 2012
Henry DeYoung; Luís Caires; Frank Pfenning; Bernardo Toninho
Prior work has shown that intuitionistic linear logic can be seen as a session-type discipline for the pi-calculus, where cut reduction in the sequent calculus corresponds to synchronous process reduction. In this paper, we exhibit a new process assignment from the asynchronous, polyadic pi-calculus to exactly the same proof rules. Proof-theoretically, the difference between these interpretations can be understood through permutations of inference rules that preserve observational equivalence of closed processes in the synchronous case. We also show that, under this new asynchronous interpretation, cut reductions correspond to a natural asynchronous buffered session semantics, where each session is allocated a separate communication buffer.
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity | 2011
Henry DeYoung; Carsten Schürmann
Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the single-winner first-past-the-post (SW-FPTP) and single transferable vote (STV) protocols demonstrate that this approach leads to concise implementations that closely correspond to their legal specification, thereby increasing trust.
asian symposium on programming languages and systems | 2016
Henry DeYoung; Frank Pfenning
We present subsingleton logic as a very small fragment of linear logic containing only \(\oplus \), \(\mathbf {1}\), least fixed points and allowing circular proofs. We show that cut-free proofs in this logic are in a Curry–Howard correspondence with subsequential finite state transducers. Constructions on finite state automata and transducers such as composition, complement, and inverse homomorphism can then be realized uniformly simply by cut and cut elimination. If we freely allow cuts in the proofs, they correspond to a well-typed class of machines we call linear communicating automata, which can also be seen as a generalization of Turing machines with multiple, concurrently operating read/write heads.
international conference on information systems security | 2011
Anupam Datta; Jeremiah Blocki; Nicolas Christin; Henry DeYoung; Deepak Garg; Limin Jia; Dilsun Kirli Kaynar; Arunesh Sinha
Archive | 2009
Henry DeYoung; Frank Pfenning
Archive | 2010
Henry DeYoung; Deepak Garg; Dilsun Kirli Kaynar; Anupam Datta
Archive | 2010
Henry DeYoung; Deepak Garg; Limin Jia; Dilsun Kirli Kaynar; Anupam Datta
Archive | 2008
Henry DeYoung