|
Publications
Trust Management
- Ninghui Li and John C. Mitchell.
RT: A Role-based Trust-management Framework.
To appear in The Third DARPA Information Survivability Conference and
Exposition (DISCEX III), Washington, D.C., April 2003.
- Ninghui Li, William H. Winsborough, and John C. Mitchell.
Distributed Credential Chain Discovery in Trust Management.
Journal of Computer Security, volume 11, number 1, pp. 35-86, February 2003.
(
Paper in PDF)
-
Extended abstract appeared in Proceedings of the 8th ACM Conference
on Computer and Communications Security (CCS-8),
Philadelphia, Pennsylvania, November 2001. ACM Press, New York,
New York, pp. 156-165.
- A. Chander, D. Dean, J.C. Mitchell.
Deconstructing Trust Management.
ACM SIGPLAN and IFIP WG 1.7 Workshop on Issues in the Theory of Security
(WITS'02) Portland, Oregon, USA, January 14-15, 2002.
Invited paper for Journal of Computer Security special issue on WITS'02.
(Paper)
- Ninghui Li and John C. Mitchell.
Datalog with Constraints: A Foundation for Trust-management Languages.
To appear in Proceedings of the Fifth International Symposium on Practical
Aspects of Declarative Languages (PADL'03), New Orleans, Louisiana, January 2003.
(
Paper in PDF)
- Ninghui Li, John C. Mitchell, and William H. Winsborough.
Design of A Role-based Trust-management Framework.
In Proceedings of 2002 IEEE Symposium on Security and Privacy,
Berkeley, California, May 2002.
IEEE Computer Society Press, Los Alamitos, California, pp. 114-130.
(
Paper in PDF)
- William H. Winsborough and Ninghui Li.
Protecting Sensitive Attributes in Automated Trust Negotiation.
To appear in Proceedings of ACM Workshop on Privacy in the Electronic
Society, Washington, DC, November 2002. Proceedings to be published
by ACM Press.
(
Paper in PDF)
- William H. Winsborough and Ninghui Li.
Towards Practical Automated Trust Negotiation.
In Proceedings of the Third International Workshop on Policies for
Distributed Systems and Networks (POLICY 2002), Monterey, California,
June 2002. IEEE Computer Society Press, Los Alamitos, California,
pp. 92-103.
(
Paper in PDF)
- A. Chander, D. Dean, and J. Mitchell.
A state-transition model of trust management and access control.
14th IEEE Computer Security Foundations Workshop,
Cape Breton, Nova Scotia, June 2001.
(Paper)
- Ninghui Li and Joan Feigenbaum.
Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation
(Position Paper).
In Proceedings of the Fifth International Conference on Financial
Cryptography (FC'01), Grand Cayman, BWI, February 2001. LNCS 2339,
Springer, Berlin, 2002, pp. 166-177.
(
Paper in PDF)
Mobile Code Security Architecture and Bytecode Instrumentation
- A. Chander, J. Mitchell, and I. Shin.
Mobile code security by Java bytecode instrumentation.
DISCEX II, 2001.
(Paper)
Protocol Analysis and Formal Methods
- Jarecki, S., Lincoln, P., and Shmatikov, V.
Negotiated
Privacy (extended abstract). To be published in LNCS as Proc.
International Symposium on Software Security (ISSS), 2002. [abstract, PS]
- Hughes, D., and Shmatikov, V.
Information Hiding,
Anonymity and Privacy: A Modular Approach . To appear in Journal of
Computer Security, 2003. [abstract, PS]
This paper subsumes the following:
- Shmatikov, V., and Hughes, D. Defining Anonymity and Privacy.
In Workshop on Issues in the Theory of Security (WITS '02), 2002.
- Shmatikov, V.
Probabilistic
Analysis of Anonymity. In Proc. 15th IEEE Computer Security Foundations
Workshop (CSFW), pages 119-128, 2002. [abstract, PS]
- Norman, G., and Shmatikov, V.
Analysis of
Probabilistic Contract Signing. In BCS-FACS Formal Aspects of Security
(FASec '02), 2002. [abstract, PS]
- Madanlal Musuvathi, David Park, Andy Chou, Dawson Engler, David L Dill.
CMC: A Pragmatic Approach to Model Checking Real Code.
In Proceedings of the Fifth Symposium on Operating Systems
Design and Implementation (OSDI),
Boston, Massachusetts, USA, December, 2002.
[Abs]
[Bib]
[PS]
[PDF]
- Satyaki Das and David L. Dill.
Counter-Example Based Predicate Discovery in Predicate Abstraction.
In Proceedings of FMCAD 2002,
Portland, Oregon, USA, November, 2002.
[Abs]
[Bib] [PS]
- Satyaki Das and David L. Dill.
Successive Approximation of Abstract Transition Relations.
In Proc. of the Sixteenth Annual IEEE Symposium on Logic in
Computer Science, Boston, Massachusetts, June 2001.
[Abs] [Bib] [PS]
Mobile networked environments and Peer-to-peer infrastructures
- Petros Maniatis and Mary Baker.
Secure History Preservation Through Timeline Entanglement.
In Proceedings of the 11th USENIX Security Symposium, San
Francisco, CA, USA. August 2002.
[PS][PDF][HTML].
(Related technical report arXiv:cs.DC/0202005
[PS] [Local
PS][Local
PDF]).
- Tyron Stading, Petros Maniatis and Mary Baker.
Peer-to-Peer Caching Schemes to Address Flash Crowds."
1st International Workshop on
Peer-to-Peer Systems (IPTPS 2002), March 2002.
[PDF]
[PS]
- Petros Maniatis and Mary Baker.
Enabling the Archival Storage of Signed Documents.
In Proceedings of the USENIX Conference on File and
Storage Technologies (FAST), Monterey, CA, USA. January 2002.
[PDF][PS][PS.GZIP][HTML]
- Petros Maniatis, T.J. Giuli, and Mary Baker.
Enabling the Long-Term Archival of Signed Documents through Time Stamping.
Technical Report cs.DC/0106058, June 28, 2001.
[PS].
Local copies: [PDF][PS]
- Petros Maniatis and Mary Baker.
IdentiScape: Tackling the Personal Online Identity Crisis.
Technical Report CSL-TR-00-804, Stanford University, June 2000.
[PDF]
[PS]
- Sergio Marti, T.J. Giuli, Kevin Lai and Mary Baker.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks.
Proceedings of Mobicom 2000, Boston, August 2000.
[PS]
- P. Maniatis, T.J. Giuli, and M. Baker.
Building Trusted Distributed Services Across Administrative Domains.
Unpublished paper, March 26, 2001.
(Paper)
|