2008 | ||
---|---|---|
61 | EE | Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabriela Gheorghe, Bruno Crispo: Enforcing DRM policies across applications. Digital Rights Management Workshop 2008: 87-94 |
60 | EE | Fatih Turkmen, Pietro Mazzoleni, Bruno Crispo, Elisa Bertino: P-CDN: Extending access control capabilities of P2P systems to provide CDN services. ISCC 2008: 480-486 |
59 | EE | Fatih Turkmen, Bruno Crispo: Performance evaluation of XACML PDP implementations. SWS 2008: 37-44 |
58 | EE | Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino: XACML Policy Integration Algorithms. ACM Trans. Inf. Syst. Secur. 11(1): (2008) |
57 | EE | Srijith Krishnan Nair, Patrick N. D. Simpson, Bruno Crispo, Andrew S. Tanenbaum: A Virtual Machine Based Information Flow Control System for Policy Enforcement. Electr. Notes Theor. Comput. Sci. 197(1): 3-16 (2008) |
56 | EE | Srijith Krishnan Nair, Ron Gerrits, Bruno Crispo, Andrew S. Tanenbaum: Turning Teenagers into Stores. IEEE Computer 41(2): 58-62 (2008) |
2007 | ||
55 | Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers Springer 2007 | |
54 | EE | Iulia Ion, Boris Dragovic, Bruno Crispo: Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices. ACSAC 2007: 233-242 |
53 | EE | Damiano Bolzoni, Bruno Crispo, Sandro Etalle: ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. LISA 2007: 141-152 |
52 | EE | Srijith Krishnan Nair, Muhammad Torabi Dashti, Bruno Crispo, Andrew S. Tanenbaum: A Hybrid PKI-IBC Based Ephemerizer System. SEC 2007: 241-252 |
51 | EE | Srijith Krishnan Nair, Ivan Djordjevic, Bruno Crispo, Theodosis Dimitrakos: Secure web service federation management using tpm virtualisation. SWS 2007: 73-82 |
50 | EE | Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Arno Bakker: Design and implementation of a secure wide-area object middleware. Computer Networks 51(10): 2484-2513 (2007) |
2006 | ||
49 | Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers Springer 2006 | |
48 | EE | Chandana Gamage, Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum: Security for the Mythical Air-Dropped Sensor Network. ISCC 2006: 41-47 |
47 | EE | Melanie R. Rieback, Georgi Gaydadjiev, Bruno Crispo, Rutger F. H. Hofman, Andrew S. Tanenbaum: A Platform for RFID Security and Privacy Administration (Awarded Best Paper!). LISA 2006: 89-102 |
46 | EE | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum: Is Your Cat Infected with a Computer Virus?. PerCom 2006: 169-179 |
45 | EE | Pietro Mazzoleni, Elisa Bertino, Bruno Crispo: XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! SACMAT 2006: 219-227 |
44 | EE | Andrew S. Tanenbaum, Chandana Gamage, Bruno Crispo: Taking Sensor Networks from the Lab to the Jungle. IEEE Computer 39(8): 98-100 (2006) |
43 | EE | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum: The Evolution of RFID Security. IEEE Pervasive Computing 5(1): 62-69 (2006) |
42 | EE | Melanie R. Rieback, Patrick N. D. Simpson, Bruno Crispo, Andrew S. Tanenbaum: RFID malware: Design principles and examples. Pervasive and Mobile Computing 2(4): 405-426 (2006) |
2005 | ||
41 | Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers Springer 2005 | |
40 | EE | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum: RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. ACISP 2005: 184-194 |
39 | EE | Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum: Counting Abuses Using Flexible Off-line Credentials. ACISP 2005: 548-559 |
38 | EE | Srijith Krishnan Nair, Bogdan C. Popescu, Chandana Gamage, Bruno Crispo, Andrew S. Tanenbaum: Enabling DRM-Preserving Digital Content Redistribution. CEC 2005: 151-158 |
37 | EE | Bruno Crispo, Swaminathan Sivasubramanian, Pietro Mazzoleni, Elisa Bertino: P-Hera: Scalable fine-grained access control for P2P infrastructures. ICPADS (1) 2005: 585-591 |
36 | EE | Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino: Efficient Integration of Fine-grained Access Control in Large-scale Grid Services. IEEE SCC 2005: 77-86 |
35 | EE | Bogdan C. Popescu, Maarten van Steen, Bruno Crispo, Andrew S. Tanenbaum, Jan Sacha, Ihor Kuz: Securely Replicated Web Documents. IPDPS 2005 |
34 | EE | Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum: How to incorporate revocation status information into the trust metrics for public-key certification. SAC 2005: 1594-1598 |
33 | EE | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum: Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags. Security Protocols Workshop 2005: 51-59 |
2004 | ||
32 | Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers Springer 2004 | |
31 | EE | Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum: Symmetric Key Authentication Services Revisited. ACISP 2004: 248-261 |
30 | Elisa Bertino, Bruno Crispo, Pietro Mazzoleni: Supporting Multi-Dimensional Trustworthiness for Grid Workflows. DELOS Workshop: Digital Library Architectures 2004: 195-204 | |
29 | EE | Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Frank Kamperman: A DRM security architecture for home networks. Digital Rights Management Workshop 2004: 1-10 |
28 | EE | Elisa Bertino, Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elena Ferrari: Towards Supporting Fine-Grained Access Control for Grid Resources. FTDCS 2004: 59-65 |
27 | EE | Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum: Support for multi-level security policies in DRM architectures. NSPW 2004: 3-9 |
26 | EE | Elisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu: Security for grid-based computing systems issues and challenges. SACMAT 2004: 125 |
25 | EE | Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum: Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System. Security Protocols Workshop 2004: 213-220 |
2003 | ||
24 | Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum: Secure Data Replication over Untrusted Hosts. HotOS 2003: 121-126 | |
23 | EE | Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum: A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System. ISCC 2003: 225-231 |
22 | EE | Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Maas Zeeman: Enforcing Security Policies for Distributed Objects Applications. Security Protocols Workshop 2003: 119-130 |
2002 | ||
21 | Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers Springer 2002 | |
20 | Francesco Bergadano, Davide Cavagnino, Bruno Crispo: Individual Authentication in Multiparty Communications. Computers & Security 21(8): 719-735 (2002) | |
2001 | ||
19 | Bruce Christianson, Bruno Crispo, Michael Roe: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers Springer 2001 | |
18 | EE | Bruno Crispo, Giancarlo Ruffo: Reasoning about Accountability within Delegation. ICICS 2001: 251-260 |
17 | EE | Bruno Crispo: Delegation Protocols for Electronic Commerce. ISCC 2001: 674-679 |
2000 | ||
16 | Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings Springer 2000 | |
15 | Francesco Bergadano, Davide Cavagnino, Bruno Crispo: Individual Single Source Authentication on the MBone. IEEE International Conference on Multimedia and Expo (I) 2000: 541-544 | |
14 | EE | Bruce Christianson, Bruno Crispo, James A. Malcolm: Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. Security Protocols Workshop 2000: 182-183 |
13 | EE | Francesco Bergadano, Davide Cavagnino, Bruno Crispo: Chained Stream Authentication. Selected Areas in Cryptography 2000: 144-157 |
12 | EE | Bruno Crispo, Peter Landrock, Václav Matyás Jr.: WWW security and trusted third party services. Future Generation Comp. Syst. 16(4): 331-341 (2000) |
1999 | ||
11 | Bruce Christianson, Bruno Crispo, William S. Harbison, Michael Roe: Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings Springer 1999 | |
10 | Francesco Bergadano, Davide Cavagnino, Bruno Crispo: Issues in Multicast Security. Security Protocols Workshop 1999: 119-139 | |
1998 | ||
9 | Bruce Christianson, Bruno Crispo, T. Mark A. Lomas, Michael Roe: Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings Springer 1998 | |
8 | EE | Bruno Crispo: Delegation of Responsibility (Position Paper). Security Protocols Workshop 1998: 118-124 |
7 | EE | Bruno Crispo: Delegation of Responsibility (Transcript of Discussion). Security Protocols Workshop 1998: 125-130 |
6 | EE | Francesco Bergadano, Bruno Crispo, Giancarlo Ruffo: High Dictionary Compression for Proactive Password Checking. ACM Trans. Inf. Syst. Secur. 1(1): 3-25 (1998) |
5 | Ross J. Anderson, Francesco Bergadano, Bruno Crispo, Jong-Hyeon Lee, Charalampos Manifavas, Roger M. Needham: A New Family of Authentication Protocols. Operating Systems Review 32(4): 9-20 (1998) | |
1997 | ||
4 | EE | Francesco Bergadano, Bruno Crispo, Giancarlo Ruffo: Proactive Password Checking with Decision Trees. ACM Conference on Computer and Communications Security 1997: 67-77 |
3 | Bruno Crispo: How to Build Evidence in a Public-Key Infrastructure for Multi-domain Environments. Security Protocols Workshop 1997: 53-65 | |
2 | Francesco Bergadano, Bruno Crispo, T. Mark A. Lomas: Strong Authentication and Privacy with Standard Browsers. Journal of Computer Security 5(3): 191-212 (1997) | |
1996 | ||
1 | Bruno Crispo, T. Mark A. Lomas: A Certification Scheme for Electronic Commerce. Security Protocols Workshop 1996: 19-32 |