The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Bruno Crispo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino
    Efficient Integration of Fine-grained Access Control in Large-scale Grid Services. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2005, pp:77-86 [Conf]
  2. Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum
    Symmetric Key Authentication Services Revisited. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:248-261 [Conf]
  3. Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum
    Counting Abuses Using Flexible Off-line Credentials. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:548-559 [Conf]
  4. Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum
    RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:184-194 [Conf]
  5. Francesco Bergadano, Bruno Crispo, Giancarlo Ruffo
    Proactive Password Checking with Decision Trees. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:67-77 [Conf]
  6. Elisa Bertino, Bruno Crispo, Pietro Mazzoleni
    Supporting Multi-Dimensional Trustworthiness for Grid Workflows. [Citation Graph (0, 0)][DBLP]
    DELOS Workshop: Digital Library Architectures, 2004, pp:195-204 [Conf]
  7. Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Frank Kamperman
    A DRM security architecture for home networks. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2004, pp:1-10 [Conf]
  8. Elisa Bertino, Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elena Ferrari
    Towards Supporting Fine-Grained Access Control for Grid Resources. [Citation Graph (0, 0)][DBLP]
    FTDCS, 2004, pp:59-65 [Conf]
  9. Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum
    Secure Data Replication over Untrusted Hosts. [Citation Graph (0, 0)][DBLP]
    HotOS, 2003, pp:121-126 [Conf]
  10. Bruno Crispo, Giancarlo Ruffo
    Reasoning about Accountability within Delegation. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:251-260 [Conf]
  11. Francesco Bergadano, Davide Cavagnino, Bruno Crispo
    Individual Single Source Authentication on the MBone. [Citation Graph (0, 0)][DBLP]
    IEEE International Conference on Multimedia and Expo (I), 2000, pp:541-544 [Conf]
  12. Bruno Crispo, Swaminathan Sivasubramanian, Pietro Mazzoleni, Elisa Bertino
    P-Hera: Scalable fine-grained access control for P2P infrastructures. [Citation Graph (0, 0)][DBLP]
    ICPADS (1), 2005, pp:585-591 [Conf]
  13. Bogdan C. Popescu, Maarten van Steen, Bruno Crispo, Andrew S. Tanenbaum, Jan Sacha, Ihor Kuz
    Securely Replicated Web Documents. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  14. Bruno Crispo
    Delegation Protocols for Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    ISCC, 2001, pp:674-679 [Conf]
  15. Chandana Gamage, Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum
    Security for the Mythical Air-Dropped Sensor Network. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:41-47 [Conf]
  16. Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum
    A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:225-231 [Conf]
  17. Melanie R. Rieback, Georgi Gaydadjiev, Bruno Crispo, Rutger F. H. Hofman, Andrew S. Tanenbaum
    A Platform for RFID Security and Privacy Administration (Awarded Best Paper!). [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:89-102 [Conf]
  18. Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum
    Support for multi-level security policies in DRM architectures. [Citation Graph (0, 0)][DBLP]
    NSPW, 2004, pp:3-9 [Conf]
  19. Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum
    Is Your Cat Infected with a Computer Virus?. [Citation Graph (0, 0)][DBLP]
    PerCom, 2006, pp:169-179 [Conf]
  20. Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum
    How to incorporate revocation status information into the trust metrics for public-key certification. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:1594-1598 [Conf]
  21. Elisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu
    Security for grid-based computing systems issues and challenges. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:125- [Conf]
  22. Pietro Mazzoleni, Elisa Bertino, Bruno Crispo
    XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:219-227 [Conf]
  23. Francesco Bergadano, Davide Cavagnino, Bruno Crispo
    Chained Stream Authentication. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:144-157 [Conf]
  24. Francesco Bergadano, Davide Cavagnino, Bruno Crispo
    Issues in Multicast Security. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:119-139 [Conf]
  25. Bruce Christianson, Bruno Crispo, James A. Malcolm
    Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:182-183 [Conf]
  26. Bruno Crispo
    How to Build Evidence in a Public-Key Infrastructure for Multi-domain Environments. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:53-65 [Conf]
  27. Bruno Crispo
    Delegation of Responsibility (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:118-124 [Conf]
  28. Bruno Crispo
    Delegation of Responsibility (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:125-130 [Conf]
  29. Bruno Crispo, T. Mark A. Lomas
    A Certification Scheme for Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:19-32 [Conf]
  30. Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum
    Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:213-220 [Conf]
  31. Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Maas Zeeman
    Enforcing Security Policies for Distributed Objects Applications. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:119-130 [Conf]
  32. Srijith Krishnan Nair, Bogdan C. Popescu, Chandana Gamage, Bruno Crispo, Andrew S. Tanenbaum
    Enabling DRM-Preserving Digital Content Redistribution. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:151-158 [Conf]
  33. Francesco Bergadano, Davide Cavagnino, Bruno Crispo
    Individual Authentication in Multiparty Communications. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:8, pp:719-735 [Journal]
  34. Andrew S. Tanenbaum, Chandana Gamage, Bruno Crispo
    Taking Sensor Networks from the Lab to the Jungle. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2006, v:39, n:8, pp:98-100 [Journal]
  35. Francesco Bergadano, Bruno Crispo, T. Mark A. Lomas
    Strong Authentication and Privacy with Standard Browsers. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1997, v:5, n:3, pp:191-212 [Journal]
  36. Ross J. Anderson, Francesco Bergadano, Bruno Crispo, Jong-Hyeon Lee, Charalampos Manifavas, Roger M. Needham
    A New Family of Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1998, v:32, n:4, pp:9-20 [Journal]
  37. Francesco Bergadano, Bruno Crispo, Giancarlo Ruffo
    High Dictionary Compression for Proactive Password Checking. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1998, v:1, n:1, pp:3-25 [Journal]
  38. Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Arno Bakker
    Design and implementation of a secure wide-area object middleware. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2484-2513 [Journal]
  39. Bruno Crispo, Peter Landrock, Václav Matyás Jr.
    WWW security and trusted third party services. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2000, v:16, n:4, pp:331-341 [Journal]

  40. A Secure and Scalable Grid-Based Content Management System. [Citation Graph (, )][DBLP]


  41. Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices. [Citation Graph (, )][DBLP]


  42. Using Description Logics in Relation Based Access Control. [Citation Graph (, )][DBLP]


  43. Enforcing DRM policies across applications. [Citation Graph (, )][DBLP]


  44. Floodgate: A Micropayment Incentivized P2P Content Delivery Network. [Citation Graph (, )][DBLP]


  45. P-CDN: Extending access control capabilities of P2P systems to provide CDN services. [Citation Graph (, )][DBLP]


  46. ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  47. Bait Your Hook: A Novel Detection Technique for Keyloggers. [Citation Graph (, )][DBLP]


  48. A service-based context management framework for cross-enterprise collaboration. [Citation Graph (, )][DBLP]


  49. A Hybrid PKI-IBC Based Ephemerizer System. [Citation Graph (, )][DBLP]


  50. Towards a Theory of White-Box Security. [Citation Graph (, )][DBLP]


  51. Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags. [Citation Graph (, )][DBLP]


  52. Towards a Secure Application-Semantic Aware Policy Enforcement Architecture. [Citation Graph (, )][DBLP]


  53. Secure web service federation management using tpm virtualisation. [Citation Graph (, )][DBLP]


  54. Performance evaluation of XACML PDP implementations. [Citation Graph (, )][DBLP]


  55. An efficient weak secrecy scheme for network coding data dissemination in VANET. [Citation Graph (, )][DBLP]


  56. Turning Teenagers into Stores. [Citation Graph (, )][DBLP]


  57. A Virtual Machine Based Information Flow Control System for Policy Enforcement. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.306secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002