dblp.uni-trier.dewww.uni-trier.de

Bruno Crispo

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
61EESrijith Krishnan Nair, Andrew S. Tanenbaum, Gabriela Gheorghe, Bruno Crispo: Enforcing DRM policies across applications. Digital Rights Management Workshop 2008: 87-94
60EEFatih Turkmen, Pietro Mazzoleni, Bruno Crispo, Elisa Bertino: P-CDN: Extending access control capabilities of P2P systems to provide CDN services. ISCC 2008: 480-486
59EEFatih Turkmen, Bruno Crispo: Performance evaluation of XACML PDP implementations. SWS 2008: 37-44
58EEPietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino: XACML Policy Integration Algorithms. ACM Trans. Inf. Syst. Secur. 11(1): (2008)
57EESrijith Krishnan Nair, Patrick N. D. Simpson, Bruno Crispo, Andrew S. Tanenbaum: A Virtual Machine Based Information Flow Control System for Policy Enforcement. Electr. Notes Theor. Comput. Sci. 197(1): 3-16 (2008)
56EESrijith Krishnan Nair, Ron Gerrits, Bruno Crispo, Andrew S. Tanenbaum: Turning Teenagers into Stores. IEEE Computer 41(2): 58-62 (2008)
2007
55 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers Springer 2007
54EEIulia Ion, Boris Dragovic, Bruno Crispo: Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices. ACSAC 2007: 233-242
53EEDamiano Bolzoni, Bruno Crispo, Sandro Etalle: ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. LISA 2007: 141-152
52EESrijith Krishnan Nair, Muhammad Torabi Dashti, Bruno Crispo, Andrew S. Tanenbaum: A Hybrid PKI-IBC Based Ephemerizer System. SEC 2007: 241-252
51EESrijith Krishnan Nair, Ivan Djordjevic, Bruno Crispo, Theodosis Dimitrakos: Secure web service federation management using tpm virtualisation. SWS 2007: 73-82
50EEBogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Arno Bakker: Design and implementation of a secure wide-area object middleware. Computer Networks 51(10): 2484-2513 (2007)
2006
49 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers Springer 2006
48EEChandana Gamage, Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum: Security for the Mythical Air-Dropped Sensor Network. ISCC 2006: 41-47
47EEMelanie R. Rieback, Georgi Gaydadjiev, Bruno Crispo, Rutger F. H. Hofman, Andrew S. Tanenbaum: A Platform for RFID Security and Privacy Administration (Awarded Best Paper!). LISA 2006: 89-102
46EEMelanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum: Is Your Cat Infected with a Computer Virus?. PerCom 2006: 169-179
45EEPietro Mazzoleni, Elisa Bertino, Bruno Crispo: XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! SACMAT 2006: 219-227
44EEAndrew S. Tanenbaum, Chandana Gamage, Bruno Crispo: Taking Sensor Networks from the Lab to the Jungle. IEEE Computer 39(8): 98-100 (2006)
43EEMelanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum: The Evolution of RFID Security. IEEE Pervasive Computing 5(1): 62-69 (2006)
42EEMelanie R. Rieback, Patrick N. D. Simpson, Bruno Crispo, Andrew S. Tanenbaum: RFID malware: Design principles and examples. Pervasive and Mobile Computing 2(4): 405-426 (2006)
2005
41 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers Springer 2005
40EEMelanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum: RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. ACISP 2005: 184-194
39EEKemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum: Counting Abuses Using Flexible Off-line Credentials. ACISP 2005: 548-559
38EESrijith Krishnan Nair, Bogdan C. Popescu, Chandana Gamage, Bruno Crispo, Andrew S. Tanenbaum: Enabling DRM-Preserving Digital Content Redistribution. CEC 2005: 151-158
37EEBruno Crispo, Swaminathan Sivasubramanian, Pietro Mazzoleni, Elisa Bertino: P-Hera: Scalable fine-grained access control for P2P infrastructures. ICPADS (1) 2005: 585-591
36EEPietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino: Efficient Integration of Fine-grained Access Control in Large-scale Grid Services. IEEE SCC 2005: 77-86
35EEBogdan C. Popescu, Maarten van Steen, Bruno Crispo, Andrew S. Tanenbaum, Jan Sacha, Ihor Kuz: Securely Replicated Web Documents. IPDPS 2005
34EEKemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum: How to incorporate revocation status information into the trust metrics for public-key certification. SAC 2005: 1594-1598
33EEMelanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum: Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags. Security Protocols Workshop 2005: 51-59
2004
32 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers Springer 2004
31EEBruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum: Symmetric Key Authentication Services Revisited. ACISP 2004: 248-261
30 Elisa Bertino, Bruno Crispo, Pietro Mazzoleni: Supporting Multi-Dimensional Trustworthiness for Grid Workflows. DELOS Workshop: Digital Library Architectures 2004: 195-204
29EEBogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Frank Kamperman: A DRM security architecture for home networks. Digital Rights Management Workshop 2004: 1-10
28EEElisa Bertino, Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elena Ferrari: Towards Supporting Fine-Grained Access Control for Grid Resources. FTDCS 2004: 59-65
27EEBogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum: Support for multi-level security policies in DRM architectures. NSPW 2004: 3-9
26EEElisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu: Security for grid-based computing systems issues and challenges. SACMAT 2004: 125
25EEBogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum: Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System. Security Protocols Workshop 2004: 213-220
2003
24 Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum: Secure Data Replication over Untrusted Hosts. HotOS 2003: 121-126
23EEBogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum: A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System. ISCC 2003: 225-231
22EEBogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Maas Zeeman: Enforcing Security Policies for Distributed Objects Applications. Security Protocols Workshop 2003: 119-130
2002
21 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers Springer 2002
20 Francesco Bergadano, Davide Cavagnino, Bruno Crispo: Individual Authentication in Multiparty Communications. Computers & Security 21(8): 719-735 (2002)
2001
19 Bruce Christianson, Bruno Crispo, Michael Roe: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers Springer 2001
18EEBruno Crispo, Giancarlo Ruffo: Reasoning about Accountability within Delegation. ICICS 2001: 251-260
17EEBruno Crispo: Delegation Protocols for Electronic Commerce. ISCC 2001: 674-679
2000
16 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings Springer 2000
15 Francesco Bergadano, Davide Cavagnino, Bruno Crispo: Individual Single Source Authentication on the MBone. IEEE International Conference on Multimedia and Expo (I) 2000: 541-544
14EEBruce Christianson, Bruno Crispo, James A. Malcolm: Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. Security Protocols Workshop 2000: 182-183
13EEFrancesco Bergadano, Davide Cavagnino, Bruno Crispo: Chained Stream Authentication. Selected Areas in Cryptography 2000: 144-157
12EEBruno Crispo, Peter Landrock, Václav Matyás Jr.: WWW security and trusted third party services. Future Generation Comp. Syst. 16(4): 331-341 (2000)
1999
11 Bruce Christianson, Bruno Crispo, William S. Harbison, Michael Roe: Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings Springer 1999
10 Francesco Bergadano, Davide Cavagnino, Bruno Crispo: Issues in Multicast Security. Security Protocols Workshop 1999: 119-139
1998
9 Bruce Christianson, Bruno Crispo, T. Mark A. Lomas, Michael Roe: Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings Springer 1998
8EEBruno Crispo: Delegation of Responsibility (Position Paper). Security Protocols Workshop 1998: 118-124
7EEBruno Crispo: Delegation of Responsibility (Transcript of Discussion). Security Protocols Workshop 1998: 125-130
6EEFrancesco Bergadano, Bruno Crispo, Giancarlo Ruffo: High Dictionary Compression for Proactive Password Checking. ACM Trans. Inf. Syst. Secur. 1(1): 3-25 (1998)
5 Ross J. Anderson, Francesco Bergadano, Bruno Crispo, Jong-Hyeon Lee, Charalampos Manifavas, Roger M. Needham: A New Family of Authentication Protocols. Operating Systems Review 32(4): 9-20 (1998)
1997
4EEFrancesco Bergadano, Bruno Crispo, Giancarlo Ruffo: Proactive Password Checking with Decision Trees. ACM Conference on Computer and Communications Security 1997: 67-77
3 Bruno Crispo: How to Build Evidence in a Public-Key Infrastructure for Multi-domain Environments. Security Protocols Workshop 1997: 53-65
2 Francesco Bergadano, Bruno Crispo, T. Mark A. Lomas: Strong Authentication and Privacy with Standard Browsers. Journal of Computer Security 5(3): 191-212 (1997)
1996
1 Bruno Crispo, T. Mark A. Lomas: A Certification Scheme for Electronic Commerce. Security Protocols Workshop 1996: 19-32

Coauthor Index

1Ross J. Anderson [5]
2Arno Bakker [50]
3Francesco Bergadano [2] [4] [5] [6] [10] [13] [15] [20]
4Elisa Bertino [26] [28] [30] [36] [37] [45] [58] [60]
5Kemal Bicakci [34] [39] [48]
6Damiano Bolzoni [53]
7Davide Cavagnino [10] [13] [15] [20]
8Bruce Christianson [9] [11] [14] [16] [19] [21] [32] [41] [49] [55]
9Muhammad Torabi Dashti [52]
10Theodosis Dimitrakos [51]
11Ivan Djordjevic [51]
12Boris Dragovic [54]
13Wengliang (Kevin) Du [26]
14Sandro Etalle [53]
15Elena Ferrari [28]
16Chandana Gamage [38] [44] [48]
17Georgi Gaydadjiev (G. N. Gaydadjiev) [47]
18Ron Gerrits [56]
19Gabriela Gheorghe [61]
20William S. Harbison [11]
21Rutger F. H. Hofman [47]
22Iulia Ion [54]
23James Joshi [26]
24Frank Kamperman [29]
25Ihor Kuz [35]
26Peter Landrock [12]
27Jong-Hyeon Lee [5]
28T. Mark A. Lomas [1] [2] [9]
29James A. Malcolm [14] [16] [21] [32] [41] [49] [55]
30Charalampos Manifavas [5]
31Václav Matyás Jr. [12]
32Pietro Mazzoleni [28] [30] [36] [37] [45] [58] [60]
33Srijith Krishnan Nair (Srijith K. Nair) [38] [51] [52] [56] [57] [61]
34Roger M. Needham [5]
35Bogdan C. Popescu [22] [23] [24] [25] [27] [29] [31] [35] [38] [50]
36Melanie R. Rieback [33] [40] [42] [43] [46] [47]
37Michael Roe [9] [11] [16] [19] [21] [32] [41] [49] [55]
38Giancarlo Ruffo [4] [6] [18]
39Jan Sacha [35]
40Ravi S. Sandhu [26]
41Patrick N. D. Simpson [42] [57]
42Swaminathan Sivasubramanian [28] [36] [37] [58]
43Maarten van Steen [35]
44Andrew S. Tanenbaum [22] [23] [24] [25] [27] [29] [31] [33] [34] [35] [38] [39] [40] [42] [43] [44] [46] [47] [48] [50] [52] [56] [57] [61]
45Fatih Turkmen [59] [60]
46Maas Zeeman [22]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)