Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Abadi, MartIn Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 5 of 18 reviews    
  Heat-seeking honeypots: design and experience
John J., Yu F., Xie Y., Krishnamurthy A., Abadi M.  WWW 2011 (Proceedings of the 20th International World Wide Web Conference, Hyderabad, India,  Mar 28-Apr 1, 2011) 207-216, 2011. Type: Proceedings

The mere existence of honeypots is a blessing. Suddenly, attackers need to worry: “This vulnerable application on a powerful server looks too good to be true. Could it be that I am the victim of a honeypot?”...
...
Jun 21 2011  
  Security analysis of cryptographically controlled access to XML documents
Abadi M., Warinschi B.  Journal of the ACM 55(2): 1-29, 2008. Type: Article

The ability to enforce policies on online access to data is a crucial ingredient of any viable Web technology. Recently, several elaborate schemes for fine-grained control of access to published Extensible Markup Language (XML) documents were deve...
...
Aug 25 2008  
  Analyzing security protocols with secrecy types and logic programs
Abadi M., Blanchet B.  Journal of the ACM 52(1): 102-146, 2005. Type: Article

This paper extends previous efforts carried out by Abadi and Blanchet toward the use of type systems to analyze security protocols. Some classic work on information flow security relies on assigning security classes to objects. A crucial point is ...
...
Mar 18 2005  
  Private authentication
Abadi M., Fournet C.  Theoretical Computer Science 322(3): 427-476, 2004. Type: Article

This paper focuses on the privacy of communication between two or more mobile interlocutors (principals), and protecting their messages and their identities from third parties (a situation that can arise in mobile telephony and mobile computing). ...
...
Mar 16 2005  
  Reasoning about secrecy for active networks
Kakkar P., Gunter C., Abadi M.  Journal of Computer Security 11(2): 245-287, 2003. Type: Article

In an internetwork context, an active network is one where chunks of mobile code, carried in packets, can be executed at routers, as well as at hosts. This can cause security-relevant changes in services, and in resources like routing tables. Agai...
...
Oct 20 2003  

 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy