Search
for Author
All Reviews
Abadi, MartIn
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
5
of
18
reviews
Heat-seeking honeypots: design and experience
John J., Yu F., Xie Y., Krishnamurthy A., Abadi M. WWW 2011 (Proceedings of the 20th International World Wide Web Conference, Hyderabad, India, Mar 28-Apr 1, 2011) 207-216, 2011. Type: Proceedings
The mere existence of honeypots is a blessing. Suddenly, attackers need to worry: “This vulnerable application on a powerful server looks too good to be true. Could it be that I am the victim of a honeypot?”...
...
Jun 21 2011
Security analysis of cryptographically controlled access to XML documents
Abadi M., Warinschi B. Journal of the ACM 55(2): 1-29, 2008. Type: Article
The ability to enforce policies on online access to data is a crucial ingredient of any viable Web technology. Recently, several elaborate schemes for fine-grained control of access to published Extensible Markup Language (XML) documen...
...
Aug 25 2008
Analyzing security protocols with secrecy types and logic programs
Abadi M., Blanchet B. Journal of the ACM 52(1): 102-146, 2005. Type: Article
This paper extends previous efforts carried out by Abadi and Blanchet toward the use of type systems to analyze security protocols. Some classic work on information flow security relies on assigning security classes to objects. A cruci...
...
Mar 18 2005
Private authentication
Abadi M., Fournet C. Theoretical Computer Science 322(3): 427-476, 2004. Type: Article
This paper focuses on the privacy of communication between two or more mobile interlocutors (principals), and protecting their messages and their identities from third parties (a situation that can arise in mobile telephony and mobile ...
...
Mar 16 2005
Reasoning about secrecy for active networks
Kakkar P., Gunter C., Abadi M. Journal of Computer Security 11(2): 245-287, 2003. Type: Article
In an internetwork context, an active network is one where chunks of mobile code, carried in packets, can be executed at routers, as well as at hosts. This can cause security-relevant changes in services, and in resources like routing ...
...
Oct 20 2003
Display
5
10
15
25
50
100
per column
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2023 ThinkLoud
®
Terms of Use
|
Privacy Policy