Search results
- Experiences with Countering Internet Attacks, Vern Paxson, 6, December, 2006
- Secrecy Analysis in Protocol Composition Logic, A. Roy, A. Datta, J. C. Mitchell, J.P. Seifert, 11th Annual Asian Computing Science Conference (ASIAN'06), December, 2006
- Hunting for metamorphic engines, Mark Stamp, Wing Wong, Journal in Computer Virology, 2, 3, 211-229, December, 2006
- Taxonomy of Security Attacks in Sensor Networks and, Tanya Roosta, Shiuhpyng Winston Shieh, Shankar Sastry, The First IEEE International Conference on System Integration and Reliability Improvements, December, 2006
- Distributed Networked Control System with Lossy Links: State Estimation and Stabilizing Communication Control, Songhwai Oh, Shankar Sastry, IEEE International Conference on Decision and Control (CDC), IEEE, December, 2006
- An Efficient Message-Passing Algorithm for Optimizing Decentralized Detection Networks, O. Patrick Kreidl, Alan S. Willsky, 2006 IEEE Conference on Decision and Control, December, 2006
- Security Breach Notification Laaws: Views from Chief Security Officers, Chris Hoofnagle, Jennifer King, Samuelson Law, Technology & Public Policy Clinic, UC Berkeley, December, 2006
- Digital Rights Management for Video Sensor Network, Taojun Wu, Liang Dai, Yuan Xue, Yi Cui, Proceedings of ISM 2006, IEEE, December, 2006
- Secure Sensor Network Routing: A Clean-Slate Approach, Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig, Conference on Future Networking Technologies (CoNEXT), December, 2006
- Legal Issues in Network Security Research, Aaron Burstein, 30, November, 2006
- Security of Sensor Networks, Tanya Roosta, 9, November, 2006
- Shades-of-High Confidence, Tariq Samad, 8, November, 2006
- Automated Intruder Tracking using Particle Filtering and a Network of Binary Motion Sensors, Jeremy Schiff, 2, November, 2006
- How is Aliasing Used in Systems Software?, B. Hackett, A. Aiken, International Symposium on Foundations of Software Engineering, 69-80, November, 2006
- P3P Privacy Enhancing Agent, Mark Stamp, Hsu Hui Lee, 2006 ACM Workshop on Secure Web Services, ACM, 109, November, 2006
- The FTC and Consumer Privacy in the Coming Decade, Joseph Turow, Chris Hoofnagle, Deirdre K. Mulligan, Nathaniel Good, Jens Grossklags, University of Pennsylvania and University of California, Berkeley, November, 2006
- Doppelganger: Better Browser Privacy Without the Bother, Umesh Shankar, Chris Karlof, Proceedings of the Thirteenth ACM Conference on Computer and Communications Security (CCS 2006), 154-167, November, 2006
- Geolocalization on the Internet through Constraint Satisfaction, Bernard Wong, Ivan Stoyanov, Emin Gun Sirer, Proceedings of Workshop on Real, Large Distributed Systems (WORLDS), Workshop on Real, Large Distributed Systems (WORLDS), November, 2006
- Robust Detection of Stepping-Stone Attacks, Ting He, Lang Tong, Proceedings of 25th Army Science Conference, Cornell University, November, 2006
- Inferring Dynamic Dependency with Applications to Link Analysis, Michael Siracusa, John Fisher, Proceeding of the 40th Asilomar Conference On Signals, Systems, and Computers, November, 2006
- Governance of Trusted Computing, Clark Thomborson, 25, October, 2006
- Scalable Trusted Computing, Ken Birman, 24, October, 2006
- When a Good Reputation isn't Good Enough, Jonathan Traupman, 19, October, 2006
- Detection of attacks on cognitive channels, Annarita Giani, 12, October, 2006
- Trustworthy Systems, Mike Reiter, Alex Aiken, David Wagner, 9, October, 2006
- EMR Project, Janos Sztipanovits, 9, October, 2006
- Online Identity Theft Web Authentication and Threats, Doug Tygar, John Mitchell, 9, October, 2006
- TRUST Sensor Networking and Embedded Systems, Steve Wicker, Deirdre Mulligan, 9, October, 2006
- Privacy and Utility in Patient Portals, Anupam Datta, 9, October, 2006
- Feedback from NSF, Industrial Advisory Board, External Advisory Board, Shankar Sastry, 8, October, 2006
- TRUST Legacy, Ken Birman, 8, October, 2006
- Workshop on Future Directions for NSF's Cyber Trust Program, Karl Levitt, David Du, Lee Gruenwald, Steve Mahaney, Ralph Wachter, Mike Reiter, Helen Conti, 8, October, 2006
- CMU Knowledge Transfer, Mike Reiter, 8, October, 2006
- What Price Insularity? Dialogs about Computer Security Failings, Fred Schneider, 4, October, 2006
- Automated Intruder Tracking using Particle Filtering and a Network of Binary Motion Sensors., Jeremy Schiff, Ken Goldberg, IEEE International Conference on Automation Science and Engineering (CASE)., October, 2006
- A Scalable Services Architecture, Tudor Marian, Ken Birman, Robbert van Renesse, Proceedings of the IEEE Symposium on Reliable Distributed Systems (SRDS 2006), October, 2006
- Learning modules for security, privacy and information assurance in undergraduate engineering education, Daniel Manson, Sigurd Meldal, Carol Sledge, Stephen M. Maurer, John C. Mitchell, Erich Spengler, Janos Sztipanovits, and Javier Torner, 36th ASEE/IEEE Frontiers in Education Conference, ASEE/IEEE, October, 2006
- Packet Scheduling Against Stepping-Stone Attacks with Chaff, Ting He, Parvathinathan Venkitasubramaniam, Lang Tong, Proceedings of IEEE MILCOM, Cornell University, October, 2006
- Towards A Formal Foundation For Domain Specific Modeling Languages, Ethan Jackson, Janos Sztipanovits, Proceedings of the Sixth ACM International Conference on Embedded Software (EMSOFT'05), October, 2006
- Design and Evaluation of Distributed Wide-Area On-line Archival Storage Systems, Hakim Weatherspoon, U.C. Berkeley, UCB/EECS-2006-130, October, 2006
- Networking with Secrecy Constraints, Parvathinathan Venkitasubramaniam, Ting He, Lang Tong, IEEE MILCOM 2006, Washington D.C, October, 2006
- A Privacy Assessment Approach for Service Oriented Architecture Applications, Weider D. Yu, Sharanya Doddapaneni, Savitha Murthy, Proceedings of The Second IEEE International Symposium on Service-Oriented System Engineering, 67-75, October, 2006
- Performance Modeling and Analysis of the IEEE 802.11 Distributed Coordination Function In Presence of Hidden Stations, Fuyi Hung, Sameer Pai, Ivan Marsic, Proceedings of the Military Communications Conference, 7, October, 2006
- Private Eyes, Amy Goldwitz, California Magazine, 118, 5, September, 2006
- Defense Against Intrusion in a Live Streaming Multicast System, Maya Haridasan, Robbert van Renesse, 6th International Conference on Peer-to-Peer Computing (P2P2006), IEEE, September, 2006
- Extensible Web Services Architecture for Notification in Large-Scale Systems, Krzysztof Ostrowski and Ken Birman, International Conference on Web Services (ICWS 2006), IEEE, September, 2006
- Defense Against Intrusion in a Live Streaming Multicast System, Maya Haridasan, Robbert van Renesse, Proceedings of the 6th IEEE International Conference on Peer-to-Peer Computing (P2P2006), September, 2006
- Capacity of Cooperative Fusion in the Presence of Byzantine Sensors, Oliver Kosut, Lang Tong, Proceedings of the 44th Annual Allerton Conference on Communication, Control, and Computation, Cornell University, September, 2006
- Towards Robustness in Query Auditing, Shubha U. Nabar, Bhaskara Marthi, Krishnaram Kenthapadi, Nina Mishra, Rajeev Motwani, Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB), September, 2006
- Relay Secrecy in Wireless Networks with Eavesdroppers, Parvathinathan Venkitasubramaniam, Ting He, Lang Tong, 44th Allerton Conference on Communication, Control and Computing, September, 2006
- Education Initiatives, Sigurd Meldal, Janos Sztipanovits, 24, August, 2006
- TRUST Center Activities, Stephen B. Wicker, 24, August, 2006
- Year 1:Research Overview, John Mitchell, Mike Reiter, Janos Sztipanovits, 24, August, 2006
- Outreach Initiatives, Ruzena Bajcsy, 24, August, 2006
- TRUST Research: Direction and Strategy, Fred B. Schneider, 24, August, 2006
- TRUST Distinguished External Advisory Board Outbrief, Jay Lala, Carl Landwehr, 24, August, 2006
- TRUST: Team for Research in Ubiquitous Secure Technologies Overview, Shankar Sastry, Ruzena Bajcsy, Sigurd Meldal, John Mitchell, Mike Reiter, Fred Schneider, Mary Margaret Sprinkle, Janos Sztipanovits, Stephen Wicker, 24, August, 2006
- Hunting for metamorphic engines, Mark Stamp, Wing Wong, 6, August, 2006
- Security and Privacy Issues with Health Care Information Technology, Marci Meingast, Tanya Roosta, Shankar Sastry, IEEE International Conference of the, August, 2006
- Making Distributed Computation Trustworthy by Construction, Lantian Zheng, Andrew C. Myers, Cornell University Computing and Information Science Technical Report, TR2006-2040, August, 2006
- 11. Static Detection of Security Vulnerabilities in Scripting Languages, Yichen Xie, Alex Aiken, 15th USENIX Security Symposium,, 179-192, July, 2006
- Security in Wireless Sensor Network, Yuan Xue, July, 2006
- Automatic Generation and Analysis of Attach Graphs, Jeanette M. Wing, July, 2006
- Network Experimentation and the DETER Testbed for Network Security Experiments, Sonia Fahmy, July, 2006
- Decentralized Robustness, Stephen Chong, Andrew C. Myers, Proceedings of the 19th IEEE Computer Security Foundations Workshop, 242-253, July, 2006
- Introducing security in a chemical engineering design course using adaptive online learning, Kenneth Debelak, Larry Howard, Yuan Xue, Christina Lee, Janos Sztipanovits, International Conference on Engineering Education, July, 2006
- A Practical Approach to Peer-to-Peer Publish-Subscribe, Ryan Peterson, Venugopalan Ramasubramanian, Emin Gun Sirer, ;login, 31, 4, 42-46, July, 2006
- 10. Statistical Debugging: Simultaneous Identification of Multiple Bugs, A. Zheng, M. Jordan, B. Liblit, M. Naik, A. Aiken, International Conference on Machine Learning, 1105-1112, June, 2006
- How the Hidden Hand Shapes the Market for Software Reliability., Ken Birman, Coimbatore Chandersekaran, Danny Dolev, Robbert van Renesse, First Workshop on Applied Software Reliability (WASR 2006), IEEE, June, 2006
- Quorum placement in networks: Minimizing network congestion, D. Golovin, A. Gupta, B.M. Maggs, F. Oprea, M. Reiter, Proceedings of the 25th ACM Symposium on Principles of Distributed Computing, 16–25, June, 2006
- Quorum placement in networks: Minimizing network congestion, D. Golovin, A. Gupta, B.M. Maggs, F. Oprea, M. Reiter, Proceedings of the 25th ACM Symposium on Principles of Distributed Computing, 16–25, June, 2006
- Reliable Multicast for Time-Critical Systems, Mahesh Balakrishnan, Ken Birman, First IEEE Workshop on Applied Software Reliability (WASR 2006), IEEE, June, 2006
- ARSL: A Language for Authorization Rule Specification in Software Security, Weider D. Yu, Ellora Nayak, The 11th IEEE International Symposium on Computers and Communications, 54-62, June, 2006
- Role based access control and the JXTA peer-to-peer framework, Mark Stamp, Amit Mathur, Suneuy Kim, Proceedings of 2006 International Conference on Security & Management, June, 2006
- ARSL: A Language for Authorization Rule Specification in Software Security, Weider D. Yu, Ellora Nayak, The 11th IEEE International Symposium on Computers and Communications, 54-62, June, 2006
- ARSL: A Language for Authorization Rule Specification in Software Security, Weider D. Yu, Ellora Nayak, Proceedings of The 11th IEEE International Symposium on Computers and Communications, 54-62, June, 2006
- Certified in-lined reference monitoring on .NET, Fred Schneider, Kevin Hamlen,& Greg Morrisett, Proceedings of the 2006 Programming Languages and Analysis for Security Workshop, June, 2006
- Jif Reference Manual, S. Chong, A. C. Myers, K. Vikram, L. Zheng, June, 2006
- Reliable Multicast for Time-Critical Systems., Mahesh Balakrishnan, Ken Birman, First Workshop on Applied Software Reliability (WASR 2006), IEEE, June, 2006
- Preserving Traffic Privacy in Wireless Mesh Networks, Taojun WU, Yuan XUE, Yi CUI, Proceedings of WOWMOM 2006, IEEE, June, 2006
- How the Hidden Hand Shapes the Market for Software Reliability, Ken Birman, Coimbatore Chandersekaran, Danny Dolev, and Robbert van Renesse, First IEEE Workshop on Applied Software Reliability, IEEE, June, 2006
- Reliable Multicast for Time-Critical Systems, Mahesh Balakrishnan and Ken Birman, 1st Workshop on Applied Software Reliability, June, 2006
- Bump in the ether: A framework for securing sensitive user input, J. M. McCune, A. Perrig and M. K. Reiter, Proceedings of the 2006 USENIX Annual Technical Conference, 185-198, June, 2006
- Achieving Anonymity via Clustering, Gagan Aggarwal, Tomas Feder, Krishnaram Kenthapadi, Samir Khuller, Rina Panigrahy, Dilys Thomas, An Zhu, 25th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, June, 2006
- Evaluation of Classifiers used in Security Applications, Alvaro Cardenas, 24, May, 2006
- Building Security into Embedded Systems: Validating Theoretical Designs using Experimental Platforms, Yuan Xue, 23, May, 2006
- .Efficient Replica Maintenance for Distributed Storage Systems, Byung-Gon Chun, Frank Dabek, Andreas Haeberlen, Emil Sit, Hakim Weatherspoon, M.Frans Kaashoek, John Kubiatowicz, 3rd USENIX Symposium on Networked Systems Design and Implementation, May, 2006
- Corona: A High Performance Publish-Subscribe System for the World Wide Web, Venugopalan Ramasubramanian, Ryan Peterson and Emin Gun Sirer, In Proceedings of Networked System Design and Implementation, San Jose, California, May, 2006
- Corona: A High Performance Publish-Subscribe System for the World Wide Web, Venugopalan Ramasubramanian, Ryan Peterson, Emin Gun Sirer, Proceedings of Networked System Design and Implementation, Networked System Design and Implementation, May, 2006
- The Joe-E Language Specification (draft), Adrian Mettler, David Wagner, U.C. Berkeley, UCB/EECS-2006-26, May, 2006
- • Automatic Inference of Stationary Fields: a Generalization of Java's Final Fields, Christopher Unkel and Monica S. Lam., 35th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, May, 2006
- • Static Detection of Leaks in Polymorphic Containers., David Heine and Monica S. Lam, 28th International Conference on Software Engineering, May, 2006
- Privacy and Contextual Integrity: Framework and Applications, Adam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum, Proceedings of 27th IEEE Symposium on Security and Privacy, May, 2006
- Virtualization Aware File Systems: Getting Beyond the Limitations of Virtual Disks, Ben Pfaff, Tal Garfinkel, Mendel Rosenblum, 3rd Symposium of Networked Systems Design and Implementation (NSDI), May, 2006
- Detecting Encrypted Interactive Stepping-Stone Connections, Ting He, Lang Tong, Proceedings of IEEE ICASSP, Cornell University, May, 2006
- Evaluation of a Deployed, Distributed Object Reputation System for Peer-to-Peer Filesharing, Kevin Walsh and Emin Gun Sirer, In Proceedings of Networked System Design and Implementation, San Jose, California, May, 2006
- Our Data, Ourselves: Privacy via Distributed Noise Generation, Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor, EUROCRYPT, May, 2006
- Detecting Encrypted Interactive Stepping-stone Connections, Ting He and Lang Tong, Proceedings of ICASSP 2006, May, 2006
- The Problem with Threads, Edward A. Lee, IEEE Computer, 39, 5, 33-42, May, 2006
- Instrumenting Wireless Sensor Networks for Real-time Surveillance, Songhwai Oh, Phoebus Chen, Michael Manzo, and Shankar Sastry, Proc. of the International Conference on Robotics and Automation, May, 2006
- Experience with an Object Reputation System for Peer-to-Peer Filesharing, Kevin Walsh, Emin Gun Sirer, Proceedings of Networked System Design and Implementation (NSDI), Networked System Design and Implementation (NSDI), May, 2006
- Detecting Encrypted Interactive Stepping-Stone Connections, Ting He, Lang Tong, Proceedings of IEEE ICASSP, Cornell University, May, 2006
- Models for Human Motion, Sumitra Ganesh, 27, April, 2006
- Intrusion tolerant services over WANs, Oprea Florian, 27, April, 2006
- Experimental Platform for Model-Based Design of Embedded Systems, Matthew Eby, Jan Werner, Janos Mathe, 27, April, 2006
- Scalable Platforms Research at Cornell University, Ken Birman, Mahesh Balakrishnan, Tudor Marian, Amar Phanishayee, 27, April, 2006
- Can Machine Learning Be Secure?, Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, J. D. Tygar, 27, April, 2006
- Privacy and Contextual Integrity: Framework and Applications, Adam Barth, 27, April, 2006
- Ensuring Privacy and Longevity of Sensitive Data, Bobji Mungamuru and Hector Garcia-Molina, 27, April, 2006
- Static and Runtime Solution for Web Application Vulnerabilities, Benjamin Livshits, Michael Martin, Monica Lam, 27, April, 2006
- Instrumenting Wireless Sensor Networks for Real-Time Surveillance, Songhwai Oh, Phoebus Chen, Michael Manzo, Shankar Sastry, 27, April, 2006
- Privacy and the Law in Demand Response Energy Systems, Erin Jones, 27, April, 2006
- Review of 1st year Research, Education, and Outreach Activities, John Mitchell, Janos Sztipanovits, Sigurd Meldal, Ruzena Bajcsy, 27, April, 2006
- Review of Center Activities, Stephen Wicker, 27, April, 2006
- Self-service, with applications to distributed classifier construction, Michael K. Reiter, Asad Samar, 27, April, 2006
- Distributed Reputation System for Tracking Applications in Sensor Networks, Tanya Roosta, Marci Meingast, 27, April, 2006
- Courseware Repository and Curriculum Adaptation, Sigurd Meldal, Weider Yu, Simon Shim, Xiao Su, 27, April, 2006
- Group-based Peer Authentication for Wireless Sensor Networks, Taojun Wu, Nathan Skirvin, Jan Werner, Brano Kusy, 27, April, 2006
- Keyboard Acoustic Emanations Revisted, Li Zhuang, Feng Zhou, 27, April, 2006
- Electronic Passport: Security and Privacy, Jen King, Marci Meingast, 27, April, 2006
- Bump in the Ether: A Framework for Securing Sensitive User Input, Jonathan M. McCune, Adrian Perrig, Michael K. Reiter, 27, April, 2006
- Defense Against Intrusion in a Live-Streaming Multicast System, Maya Haridasan, Robbert Van Renesse, Haavard Johansen, 27, April, 2006
- Learning Technologies Infrastructure, Larry Howard, 27, April, 2006
- Crypotgraphic Voting Protocol: A Systems Perspective, Chris Karlof, Naveen Sastry, David Wagner, 27, April, 2006
- TRUST Patient Portal Project - Real Time Patient Monitoring, Josh Denny, Mike Eklund, Philip Kuryloski, Dan Masys, Marci Meingast, Sameer Pai, Tanya Roosta, Shankar Sastry, Bill Stead, Janos Sztipanovits, Stephen Wicker, Yuan Xue, 27, April, 2006
- Finite Element Surface-based Stereo 3D Reconstruction, Edgar J Lobaton Lopez, 27, April, 2006
- Co-design Environment for Secure Embedded Systems, Matt Eby, Janos Mathe, Jan Werner, 27, April, 2006
- TRUST:Team for Research in Ubiquitous Secure Technologies Overview, Shankar Sastry, 27, April, 2006
- Experimental Platform for Model-Based Design of Embedded Systems, Matthew Eby, Jan Werner, Janos Laszlo Mathe, Gabor Karsai, Sandeep Neema, Janos Sztipanovits, Yuan Xue, April, 2006
- Integrating Security Modeling in Embedded System Design, Jan Werner, Matthew Eby, Janos Laszlo Mathe, Gabor Karsai, Yuan Xue, Janos Sztipanovits, IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), April, 2006
- TRUST Annual Report 2005-2006, Faculty and staff, University of California, Berkeley, April, 2006
- Fireflies: Scalable Support for Intrusion-Tolerant Overlay Networks, Havard Johansen, Andre Allavena, Robbert van Renesse, Proceedings of Eurosys 2006, Willy Zwaenepoel, ACM European Chapter, April, 2006
- TRUST 1st Five Year Strategic and Implementation Plan, Shankar Sastry, Ruzena Bajcsy, Sigurd Meldal, John Mitchell, Vijay Raghavan, Mike Reiter, Fred Schneider, Janos Sztipanovits, Stephen Wicker, Team for Research in Ubiquitous Secure Technology (TRUST), April, 2006
- Heuristics Considered Harmful: Using Mathematical Optimization for Resource Management in Distributed Systems, Emin Gun Sirer, IEEE Intelligent Systems, Special Issue on Self-Management through Self-Organization in Information Systems, 55-57, April, 2006
- QuickSilver Scalable Multicast, Krzysztof Ostrowski, Ken Birman, Amar Phanishayee, Cornell University, TR2006-2063, April, 2006
- Node-Density Independent Localization, B. Kusy, G.. Balogh, P. Volgyesi, J. Sallai, A. Nadas, A. Ledeczi, M. Maroti, L. Meertens, Information Processing in Sensor Networks (IPSN 06) SPOTS Track, April, 2006
- Integrating Security Modeling in Embedded System Design, Jan Werner, Matthew Eby, Janos Mathe, Gabor Karsai, Yuan Xue, Janos Sztipanovits, IEEE Real-Time and Embedded Technology and Applications Symposium, April, 2006
- Privacy and Security in Demand Response Energy Systems, Erin Jones, 21, March, 2006
- Better web browser privacy using automation, Umesh Shankar, 7, March, 2006
- A Signal Processing Prospective to Stepping-stone Detection, Ting He and Lang Tong, Proceedings of Conference on Information Sciences and Systems 2006, March, 2006
- Correct-ed through Construction: A Model-based Approach to Embedded Systems Reality, Ethan Jackson, Janos Sztipanovits, 3th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS), March, 2006
- A Signal Processing Prospective to Stepping-stone Detection, Ting He and Lang Tong, Proc. Conference on Information Sciences and Systems 2006 (CISS'06), March, 2006
- Lightweight, Pollution-Attack Resistant Multicast Authentication Scheme, Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin, ACM Symposium on Information, Computer and Communications Security, ACM, 148-156, March, 2006
- An Efficient Broadcast Authentication Scheme, Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, Chih-Ming Hsieh, ACM Symposium on Information, Computer and Communications Security, ACM, pp. 311-320, March, 2006
- Self-Timed Thermally Aware Circuits, David Fang, Filipp Akopyan, and Rajit Manohar, IEEE Computer Society Annual Symposium on VLSI, March, 2006
- A Signal Processing Perspective to Stepping-Stone Detection, Ting He, Lang Tong, Proceedings of IEEE CISS, Cornell University, March, 2006
- Heuristics Considered Harmful: Using Mathematical Optimization for Resource Management in Distributed Systems, Emin Gun Sirer, IEEE Intelligent Systems, Special Issue on Self-Management through Self-Organization in Information Systems, March, 2006
- A level-crossing Flash Asynchronous Analog-to-Digital Converter, Filipp Akopyan, Rajit Manohar, and Alyssa Apsel, 12th International Symposium on Asynchronous Circuits and Systems, March, 2006
- Developing Applications Using Model-Driven Design Environments, Krishnakumar Balasubramanian, Aniruddha Gokhale, Gabor Karsai, Janos Sztipanovits, Sandeep Neema, IEEE Computer, 39, 2, 33-40, February, 2006
- Model-Driven Engineering, Douglas C. Schmidt, IEEE Computer, 39, 2, February, 2006
- The Untrustworthy Web Services Revolution, Ken Birman, IEEE Computer, 39, 2, 113-115, February, 2006
- Air Force Center for Research on GIG/NCES Challenges (AF-TRUST-GNC), Ken Birman, 10, January, 2006
- Securing Public Spaces with Sensor Networks: Science, Technology, and Privacy, Stephen Wicker, 10, January, 2006
- TRUST: Team for Research in Ubiquitous Secure Technologies, an overview, Shankar Sastry, 10, January, 2006
- The TRUST Agenda: Convergence of Technical and Policy Issues, Fred B. Schneider, 10, January, 2006
- Integrative Projects, Janos Sztipanovits, 10, January, 2006
- Education and Outreach, Sigurd Meldal, Janos Sztipanovits, Ruzena Bajcsy, 10, January, 2006
- TWISC -Taiwan Information Security Center, D.T. Lee, 10, January, 2006
- Combating Online Identity Theft: Spoofguard, PwdHash, Spyware, Botnets, John Mitchell, 10, January, 2006
- Fall Monitoring in the Elderly, Ruzena Bajcsy, 9, January, 2006
- Trust Winter Meeting Outbrief: Phishing, Identity Theft, and Related Issues, John Mitchell, 9, January, 2006
- Trust Winter Meeting Outbrief: Network Defenses, Anthony Joseph, 9, January, 2006
- Trust Winter Meeting Outbrief:Trustworthy Systems, Mike Reiter, 9, January, 2006
- Trust Winter Meeting Outbrief: Integrative Projects: Patient Portals, Janos Sztipanovits, 9, January, 2006
- Trust Winter Meeting Outbrief: Programming Language Techniques for Software Security, David Wagner, 9, January, 2006
- Trust Winter Meeting Outbrief: Software System Dependability Breakout Session, Doug Schmidt, 9, January, 2006
- Trust Winter Meeting Outbrief: Embedded Systems and Secure Sensor Networks, Stephen Wicker, 9, January, 2006
- Experimental Platform forSystems-Security Codesign, Matthew Eby, Janos Laszlo Mathe, Jan Werner, January, 2006
- Role-based Access Modeling for Patient Portal, Matthew Eby, J. Mikael Eklund, Gabor Karsai, Philip Kuryloski, Dan Masys, Janos Laszlo Mathe, John C. Mitchell, Bill Stead, Shankar Sastry, Janos Sztipanovits, Jan Werner, Stephen Wicker, Yuan Xue, January, 2006
- Experimental Embedded System Platform for System/Security Co-Design, Matthew Eby, Janos Laszlo Mathe, Jan Werner, Janos Sztipanovits, Gabor Karsai, Yuan Xue, January, 2006
- Modeling Security Aspects in Embedded Systems, Matthew Eby, Jan Werner, Janos Laszlo Mathe, Gabor Karsai, Sandeep Neema, Janos Sztipanovits, Yuan Xue, January, 2006
- Autonomic Computing - A System-Wide Perspective, Robbert van Renesse and Kenneth P. Birman, Autonomic Computing: Concepts, Infrastructure, and Applications, January, 2006
- Independence From Obfuscation: A Semantic Framework for Diversity, Riccardo Pucella and Fred B. Schneider, Cornell University, TR2006-2016, January, 2006
- Interruptible Iterators, Jed Liu, Aaron Kimball, Andrew C. Meyers, January, 2006
- ClosestNode.com: An Open-Access, Scalable, Shared Geocast Service for Distributed Systems, Bernard Wong and Emin Gun Sirer, In SIGOPS Operating Systems Review, 40, 1, January, 2006
- User Choices and Regret: Understanding Users' Decision Process about Consensually acquired Spyware, Nathaniel Good, Jens Grossklags, David Thaw, Aaron Perzanowski, Deirdre K. Mulligan, Joseph Konstan, I/S: A Journal of Law and Policy for the Information Society, 2, 2, January, 2006
- Nonparametric Bayesian Methods for Large Scale Multi-Target Tracking, Emily B. Fox, David Choi, Alan S. Willsky, Proceedings of the 40th Asilomar Conference on Signals, Systems, and Computers, January, 2006
- Why Phishing Works, Rachna Dhamija, Doug Tygar, Marti Hearst, CHI '06: Proceedings of the SIGCHI conference on Human Factors in computing systems, ACM Special Interest Group on Computer-Human Interaction, 581-590, January, 2006
- • Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles., D. Boneh, X. Boyen, S. Halevi, RSA-CT, 226-243, 2006
- • Chosen-Ciphertext Security from Identity-Based Encryption, D. Boneh, R. Canetti, S. Halevi, J. Katz, SIAM J. of Computing, 915-942, 2006
- • Private encrypted content distribution using private broadcast encryption, A. Barth, D. Boneh, and B. Waters, Financial Crypto, 2006
- • Strongly Unforgeable Signatures Based on Computational Diffie-Hellman, D. Boneh, E. Shen, and B. Waters, PKC, 2006
- Disruption-Aware Dynamic Component Deployment and Composition in Ultra-Large-Scale (ULS) Systems, Yuan Xue, Shanshan Jiang, Workshop on Ultra-Large-Scale Systems, held in conjunction with ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), 2006
- Flow-Insensitive Type Qualifiers, J. Foster, J. Kodumal, R. Johnson, A. Aiken, ACM Transactions on Programming Languages and Systems, 2006
- Privacy and Technologies of Identity: A Cross-Disciplinary Conversation, Christopher J. Clifton, Deirdre K. Mulligan, Raghu Ramakrishnan, Katherine Strandburg, Daniela Stan Raicu, 11, 191-208, Springer, 2006
- SENSTRAC: Scalable Querying of SENSor Networks from Mobile Platforms Using TRACking-Style Queries., Stefan Pleisch, Ken Birman, International Journal of Sensor Networks (IJSNet), Yang Xiao, Inderscience Publishers, 2006
- Protecting Browser State from Web Privacy Attacks, C. Jackson, A. Bortz, D. Boneh, and J. Mitchell, 15th International Conference on World Wide Web, 2006
- • Fully Collusion Resistant Traitor Tracing With Short Ciphertexts and Private Keys, D. Boneh, A. Sahai, and B. Waters, Eurocrypt, 2006
- • SANE: A protection architecture for enterprise networks., M. Casado, Tal Garfinkel, A. Akella, M. Freedman, D. Boneh, N. McKeown, and S. Shenker, Usenix Security, 2006
- OASiS: A Service-Oriented Architecture for Ambient-Aware Sensor Networks, Xenofon Koutsoukos, Manish Kushwaha, Isaac E Amundson, Sandeep Neema, Janos Sztipanovits, Proceedings of the 13th Monterey Workshop on Composition of Embedded Systems, Scientific and Industrial Issues, Fabrice Kordan and Oleg Sokolsky, 2006
- The Analysis of a Game Theoretic MAC Protocol for Wireless Networks, Hazer Inaltekin, IEEE Secon 2006, 2006
- Distributed Reputation System for Tracking Applications in Sensor Networks, Tanya Roosta, Marci Meingast, Shankar Sastry, International Workshop on Advances in Sensor Networks 2006(IWASN 2006), 2006
- Multilevel security models (in The Handbook of Information Security), Mark Stamp, Ali Hushyar, Wiley, 2006
- Enforcing Robust Declassification and Qualified Robustness, Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic, Journal of Computer Security, 157-196, 2006
- Information Security: Principles and Practice, Mark Stamp, Wiley InterScience, 2006, 978-0-471-73848-0
- Reliable Distributed Systems Technologies, Web Services, and Applications, Ken Birman, Springer, 2006, 0-387-21509-3
- • On the impossibility of efficiently combining collision resistant hash functions., D. Boneh and X. Boyen, Crypto, 2006
- ClosestNode.com: An Open-Access, Scalable, Shared Geocast Service for Distributed Systems., Bernard Wong, Emin Gun Sirer, SIGOPS Operating Systems Review, 40, 1, 2006
- • Secure function evaluation with ordered binary decision diagrams, L. Kruger, S. Jha, E. Goh, and D. Boneh, ACM Conference on Computer and Communications Security, 2006
- • A collusion resistant broadcast, trace and revoke system, D. Boneh and B. Waters, ACM CCS, 2006
Found 200 publications.
Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.