2008 |
61 | EE | Srijith Krishnan Nair,
Andrew S. Tanenbaum,
Gabriela Gheorghe,
Bruno Crispo:
Enforcing DRM policies across applications.
Digital Rights Management Workshop 2008: 87-94 |
60 | EE | Fatih Turkmen,
Pietro Mazzoleni,
Bruno Crispo,
Elisa Bertino:
P-CDN: Extending access control capabilities of P2P systems to provide CDN services.
ISCC 2008: 480-486 |
59 | EE | Fatih Turkmen,
Bruno Crispo:
Performance evaluation of XACML PDP implementations.
SWS 2008: 37-44 |
58 | EE | Pietro Mazzoleni,
Bruno Crispo,
Swaminathan Sivasubramanian,
Elisa Bertino:
XACML Policy Integration Algorithms.
ACM Trans. Inf. Syst. Secur. 11(1): (2008) |
57 | EE | Srijith Krishnan Nair,
Patrick N. D. Simpson,
Bruno Crispo,
Andrew S. Tanenbaum:
A Virtual Machine Based Information Flow Control System for Policy Enforcement.
Electr. Notes Theor. Comput. Sci. 197(1): 3-16 (2008) |
56 | EE | Srijith Krishnan Nair,
Ron Gerrits,
Bruno Crispo,
Andrew S. Tanenbaum:
Turning Teenagers into Stores.
IEEE Computer 41(2): 58-62 (2008) |
2007 |
55 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers
Springer 2007 |
54 | EE | Iulia Ion,
Boris Dragovic,
Bruno Crispo:
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices.
ACSAC 2007: 233-242 |
53 | EE | Damiano Bolzoni,
Bruno Crispo,
Sandro Etalle:
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems.
LISA 2007: 141-152 |
52 | EE | Srijith Krishnan Nair,
Muhammad Torabi Dashti,
Bruno Crispo,
Andrew S. Tanenbaum:
A Hybrid PKI-IBC Based Ephemerizer System.
SEC 2007: 241-252 |
51 | EE | Srijith Krishnan Nair,
Ivan Djordjevic,
Bruno Crispo,
Theodosis Dimitrakos:
Secure web service federation management using tpm virtualisation.
SWS 2007: 73-82 |
50 | EE | Bogdan C. Popescu,
Bruno Crispo,
Andrew S. Tanenbaum,
Arno Bakker:
Design and implementation of a secure wide-area object middleware.
Computer Networks 51(10): 2484-2513 (2007) |
2006 |
49 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers
Springer 2006 |
48 | EE | Chandana Gamage,
Kemal Bicakci,
Bruno Crispo,
Andrew S. Tanenbaum:
Security for the Mythical Air-Dropped Sensor Network.
ISCC 2006: 41-47 |
47 | EE | Melanie R. Rieback,
Georgi Gaydadjiev,
Bruno Crispo,
Rutger F. H. Hofman,
Andrew S. Tanenbaum:
A Platform for RFID Security and Privacy Administration (Awarded Best Paper!).
LISA 2006: 89-102 |
46 | EE | Melanie R. Rieback,
Bruno Crispo,
Andrew S. Tanenbaum:
Is Your Cat Infected with a Computer Virus?.
PerCom 2006: 169-179 |
45 | EE | Pietro Mazzoleni,
Elisa Bertino,
Bruno Crispo:
XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!
SACMAT 2006: 219-227 |
44 | EE | Andrew S. Tanenbaum,
Chandana Gamage,
Bruno Crispo:
Taking Sensor Networks from the Lab to the Jungle.
IEEE Computer 39(8): 98-100 (2006) |
43 | EE | Melanie R. Rieback,
Bruno Crispo,
Andrew S. Tanenbaum:
The Evolution of RFID Security.
IEEE Pervasive Computing 5(1): 62-69 (2006) |
42 | EE | Melanie R. Rieback,
Patrick N. D. Simpson,
Bruno Crispo,
Andrew S. Tanenbaum:
RFID malware: Design principles and examples.
Pervasive and Mobile Computing 2(4): 405-426 (2006) |
2005 |
41 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers
Springer 2005 |
40 | EE | Melanie R. Rieback,
Bruno Crispo,
Andrew S. Tanenbaum:
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management.
ACISP 2005: 184-194 |
39 | EE | Kemal Bicakci,
Bruno Crispo,
Andrew S. Tanenbaum:
Counting Abuses Using Flexible Off-line Credentials.
ACISP 2005: 548-559 |
38 | EE | Srijith Krishnan Nair,
Bogdan C. Popescu,
Chandana Gamage,
Bruno Crispo,
Andrew S. Tanenbaum:
Enabling DRM-Preserving Digital Content Redistribution.
CEC 2005: 151-158 |
37 | EE | Bruno Crispo,
Swaminathan Sivasubramanian,
Pietro Mazzoleni,
Elisa Bertino:
P-Hera: Scalable fine-grained access control for P2P infrastructures.
ICPADS (1) 2005: 585-591 |
36 | EE | Pietro Mazzoleni,
Bruno Crispo,
Swaminathan Sivasubramanian,
Elisa Bertino:
Efficient Integration of Fine-grained Access Control in Large-scale Grid Services.
IEEE SCC 2005: 77-86 |
35 | EE | Bogdan C. Popescu,
Maarten van Steen,
Bruno Crispo,
Andrew S. Tanenbaum,
Jan Sacha,
Ihor Kuz:
Securely Replicated Web Documents.
IPDPS 2005 |
34 | EE | Kemal Bicakci,
Bruno Crispo,
Andrew S. Tanenbaum:
How to incorporate revocation status information into the trust metrics for public-key certification.
SAC 2005: 1594-1598 |
33 | EE | Melanie R. Rieback,
Bruno Crispo,
Andrew S. Tanenbaum:
Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags.
Security Protocols Workshop 2005: 51-59 |
2004 |
32 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers
Springer 2004 |
31 | EE | Bruno Crispo,
Bogdan C. Popescu,
Andrew S. Tanenbaum:
Symmetric Key Authentication Services Revisited.
ACISP 2004: 248-261 |
30 | | Elisa Bertino,
Bruno Crispo,
Pietro Mazzoleni:
Supporting Multi-Dimensional Trustworthiness for Grid Workflows.
DELOS Workshop: Digital Library Architectures 2004: 195-204 |
29 | EE | Bogdan C. Popescu,
Bruno Crispo,
Andrew S. Tanenbaum,
Frank Kamperman:
A DRM security architecture for home networks.
Digital Rights Management Workshop 2004: 1-10 |
28 | EE | Elisa Bertino,
Pietro Mazzoleni,
Bruno Crispo,
Swaminathan Sivasubramanian,
Elena Ferrari:
Towards Supporting Fine-Grained Access Control for Grid Resources.
FTDCS 2004: 59-65 |
27 | EE | Bogdan C. Popescu,
Bruno Crispo,
Andrew S. Tanenbaum:
Support for multi-level security policies in DRM architectures.
NSPW 2004: 3-9 |
26 | EE | Elisa Bertino,
Bruno Crispo,
James Joshi,
Wengliang (Kevin) Du,
Ravi S. Sandhu:
Security for grid-based computing systems issues and challenges.
SACMAT 2004: 125 |
25 | EE | Bogdan C. Popescu,
Bruno Crispo,
Andrew S. Tanenbaum:
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System.
Security Protocols Workshop 2004: 213-220 |
2003 |
24 | | Bogdan C. Popescu,
Bruno Crispo,
Andrew S. Tanenbaum:
Secure Data Replication over Untrusted Hosts.
HotOS 2003: 121-126 |
23 | EE | Bogdan C. Popescu,
Bruno Crispo,
Andrew S. Tanenbaum:
A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System.
ISCC 2003: 225-231 |
22 | EE | Bogdan C. Popescu,
Bruno Crispo,
Andrew S. Tanenbaum,
Maas Zeeman:
Enforcing Security Policies for Distributed Objects Applications.
Security Protocols Workshop 2003: 119-130 |
2002 |
21 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers
Springer 2002 |
20 | | Francesco Bergadano,
Davide Cavagnino,
Bruno Crispo:
Individual Authentication in Multiparty Communications.
Computers & Security 21(8): 719-735 (2002) |
2001 |
19 | | Bruce Christianson,
Bruno Crispo,
Michael Roe:
Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers
Springer 2001 |
18 | EE | Bruno Crispo,
Giancarlo Ruffo:
Reasoning about Accountability within Delegation.
ICICS 2001: 251-260 |
17 | EE | Bruno Crispo:
Delegation Protocols for Electronic Commerce.
ISCC 2001: 674-679 |
2000 |
16 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings
Springer 2000 |
15 | | Francesco Bergadano,
Davide Cavagnino,
Bruno Crispo:
Individual Single Source Authentication on the MBone.
IEEE International Conference on Multimedia and Expo (I) 2000: 541-544 |
14 | EE | Bruce Christianson,
Bruno Crispo,
James A. Malcolm:
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms.
Security Protocols Workshop 2000: 182-183 |
13 | EE | Francesco Bergadano,
Davide Cavagnino,
Bruno Crispo:
Chained Stream Authentication.
Selected Areas in Cryptography 2000: 144-157 |
12 | EE | Bruno Crispo,
Peter Landrock,
Václav Matyás Jr.:
WWW security and trusted third party services.
Future Generation Comp. Syst. 16(4): 331-341 (2000) |
1999 |
11 | | Bruce Christianson,
Bruno Crispo,
William S. Harbison,
Michael Roe:
Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings
Springer 1999 |
10 | | Francesco Bergadano,
Davide Cavagnino,
Bruno Crispo:
Issues in Multicast Security.
Security Protocols Workshop 1999: 119-139 |
1998 |
9 | | Bruce Christianson,
Bruno Crispo,
T. Mark A. Lomas,
Michael Roe:
Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings
Springer 1998 |
8 | EE | Bruno Crispo:
Delegation of Responsibility (Position Paper).
Security Protocols Workshop 1998: 118-124 |
7 | EE | Bruno Crispo:
Delegation of Responsibility (Transcript of Discussion).
Security Protocols Workshop 1998: 125-130 |
6 | EE | Francesco Bergadano,
Bruno Crispo,
Giancarlo Ruffo:
High Dictionary Compression for Proactive Password Checking.
ACM Trans. Inf. Syst. Secur. 1(1): 3-25 (1998) |
5 | | Ross J. Anderson,
Francesco Bergadano,
Bruno Crispo,
Jong-Hyeon Lee,
Charalampos Manifavas,
Roger M. Needham:
A New Family of Authentication Protocols.
Operating Systems Review 32(4): 9-20 (1998) |
1997 |
4 | EE | Francesco Bergadano,
Bruno Crispo,
Giancarlo Ruffo:
Proactive Password Checking with Decision Trees.
ACM Conference on Computer and Communications Security 1997: 67-77 |
3 | | Bruno Crispo:
How to Build Evidence in a Public-Key Infrastructure for Multi-domain Environments.
Security Protocols Workshop 1997: 53-65 |
2 | | Francesco Bergadano,
Bruno Crispo,
T. Mark A. Lomas:
Strong Authentication and Privacy with Standard Browsers.
Journal of Computer Security 5(3): 191-212 (1997) |
1996 |
1 | | Bruno Crispo,
T. Mark A. Lomas:
A Certification Scheme for Electronic Commerce.
Security Protocols Workshop 1996: 19-32 |