Agile Management of Dynamic Collaboration

Project Overview


Trust Management

Mobile Code Security Architecture and Bytecode Instrumentation

  • A. Chander, J. Mitchell, and I. Shin. Mobile code security by Java bytecode instrumentation. DISCEX II, 2001. (Paper)

Protocol Analysis and Formal Methods

  • Jarecki, S., Lincoln, P., and Shmatikov, V. Negotiated Privacy (extended abstract). To be published in LNCS as Proc. International Symposium on Software Security (ISSS), 2002.   [abstract, PS]

  • Hughes, D., and Shmatikov, V. Information Hiding, Anonymity and Privacy: A Modular Approach . To appear in Journal of Computer Security, 2003.   [abstract, PS]
    This paper subsumes the following:
    • Shmatikov, V., and Hughes, D. Defining Anonymity and Privacy. In Workshop on Issues in the Theory of Security (WITS '02), 2002.

  • Shmatikov, V. Probabilistic Analysis of Anonymity. In Proc. 15th IEEE Computer Security Foundations Workshop (CSFW), pages 119-128, 2002.   [abstract, PS]
  • Norman, G., and Shmatikov, V. Analysis of Probabilistic Contract Signing. In BCS-FACS Formal Aspects of Security (FASec '02), 2002.   [abstract, PS]

  • Madanlal Musuvathi, David Park, Andy Chou, Dawson Engler, David L Dill. CMC: A Pragmatic Approach to Model Checking Real Code. In Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI), Boston, Massachusetts, USA, December, 2002. [Abs] [Bib] [PS] [PDF]

  • Satyaki Das and David L. Dill. Counter-Example Based Predicate Discovery in Predicate Abstraction. In Proceedings of FMCAD 2002, Portland, Oregon, USA, November, 2002. [Abs] [Bib] [PS]

  • Satyaki Das and David L. Dill. Successive Approximation of Abstract Transition Relations. In Proc. of the Sixteenth Annual IEEE Symposium on Logic in Computer Science, Boston, Massachusetts, June 2001. [Abs] [Bib] [PS]

Mobile networked environments and Peer-to-peer infrastructures

  • Petros Maniatis and Mary Baker. Secure History Preservation Through Timeline Entanglement. In Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA. August 2002. [PS][PDF][HTML]. (Related technical report arXiv:cs.DC/0202005 [PS] [Local PS][Local PDF]).

  • Tyron Stading, Petros Maniatis and Mary Baker. Peer-to-Peer Caching Schemes to Address Flash Crowds." 1st International Workshop on Peer-to-Peer Systems (IPTPS 2002), March 2002. [PDF] [PS]

  • Petros Maniatis and Mary Baker. Enabling the Archival Storage of Signed Documents. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST), Monterey, CA, USA. January 2002. [PDF][PS][PS.GZIP][HTML]

  • Petros Maniatis, T.J. Giuli, and Mary Baker. Enabling the Long-Term Archival of Signed Documents through Time Stamping. Technical Report cs.DC/0106058, June 28, 2001. [PS]. Local copies: [PDF][PS]
  • Petros Maniatis and Mary Baker. IdentiScape: Tackling the Personal Online Identity Crisis. Technical Report CSL-TR-00-804, Stanford University, June 2000. [PDF] [PS]
  • Sergio Marti, T.J. Giuli, Kevin Lai and Mary Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. Proceedings of Mobicom 2000, Boston, August 2000. [PS]

  • P. Maniatis, T.J. Giuli, and M. Baker. Building Trusted Distributed Services Across Administrative Domains. Unpublished paper, March 26, 2001. (Paper)