2005 |
9 | EE | Bob Blakley,
G. R. Blakley:
All Sail, No Anchor III: Risk Aggregation and Time's Arrow.
ACISP 2005: 1-16 |
2004 |
8 | EE | Bob Blakley,
G. R. Blakley:
All sail, no anchor II: Acceptable high-end PKI.
Int. J. Inf. Sec. 2(2): 66-77 (2004) |
2002 |
7 | | Bob Blakley:
Security Insights.
Computers & Security 21(2): 120-125 (2002) |
2001 |
6 | EE | Bob Blakley,
Ellen McDermott,
Dan Geer:
Information security is information risk management.
NSPW 2001: 97-104 |
2000 |
5 | | Bob Blakley,
G. R. Blakley:
All Sail, No Anchor, 1: Cryptography, Risk, and e-Commerce.
ACISP 2000: 471-476 |
1999 |
4 | EE | Konstantin Beznosov,
Yi Deng,
Bob Blakley,
C. Burt,
John F. Barkley:
A Resource Access Decision Service for CORBA-Based Distributed Systems.
ACSAC 1999: 310-319 |
1997 |
3 | EE | Bob Blakley,
Darrell M. Kienzle:
Some weaknesses of the TCB model.
IEEE Symposium on Security and Privacy 1997: 3-5 |
1996 |
2 | | Messaoud Benantar,
Bob Blakley,
Anthony J. Nadalin:
Approach to Object Security in Distributed SOM.
IBM Systems Journal 35(2): 192-203 (1996) |
1992 |
1 | EE | Bob Blakley,
G. R. Blakley,
Agnes Hui Chan,
James L. Massey:
Threshold Schemes with Disenrollment.
CRYPTO 1992: 540-548 |