dblp.uni-trier.dewww.uni-trier.de

Bruno Crispo Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
66EERui Zhang, Alessandro Artale, Fausto Giunchiglia, Bruno Crispo: Using Description Logics in Relation Based Access Control. Description Logics 2009
65EEAmir Herzberg, Haya Shulman, Amitabh Saxena, Bruno Crispo: Towards a Theory of White-Box Security. SEC 2009: 342-352
2008
64EESrijith Krishnan Nair, Andrew S. Tanenbaum, Gabriela Gheorghe, Bruno Crispo: Enforcing DRM policies across applications. Digital Rights Management Workshop 2008: 87-94
63EESrijith Krishnan Nair, Erik Zentveld, Bruno Crispo, Andrew S. Tanenbaum: Floodgate: A Micropayment Incentivized P2P Content Delivery Network. ICCCN 2008: 291-297
62EEFatih Turkmen, Pietro Mazzoleni, Bruno Crispo, Elisa Bertino: P-CDN: Extending access control capabilities of P2P systems to provide CDN services. ISCC 2008: 480-486
61EEMario Gerlay, Roberto G. Cascella, Zhen Caoy, Bruno Crispo, Roberto Battiti: An efficient weak secrecy scheme for network coding data dissemination in VANET. PIMRC 2008: 1-5
60EEFatih Turkmen, Bruno Crispo: Performance evaluation of XACML PDP implementations. SWS 2008: 37-44
59EEPietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino: XACML Policy Integration Algorithms. ACM Trans. Inf. Syst. Secur. 11(1): (2008)
58EESrijith Krishnan Nair, Patrick N. D. Simpson, Bruno Crispo, Andrew S. Tanenbaum: A Virtual Machine Based Information Flow Control System for Policy Enforcement. Electr. Notes Theor. Comput. Sci. 197(1): 3-16 (2008)
57EESrijith Krishnan Nair, Ron Gerrits, Bruno Crispo, Andrew S. Tanenbaum: Turning Teenagers into Stores. IEEE Computer 41(2): 58-62 (2008)
2007
56 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers Springer 2007
55EEIulia Ion, Boris Dragovic, Bruno Crispo: Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices. ACSAC 2007: 233-242
54EEDamiano Bolzoni, Bruno Crispo, Sandro Etalle: ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. LISA 2007: 141-152
53EESrijith Krishnan Nair, Muhammad Torabi Dashti, Bruno Crispo, Andrew S. Tanenbaum: A Hybrid PKI-IBC Based Ephemerizer System. SEC 2007: 241-252
52EESrijith Krishnan Nair, Ivan Djordjevic, Bruno Crispo, Theodosis Dimitrakos: Secure web service federation management using tpm virtualisation. SWS 2007: 73-82
51EEBogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Arno Bakker: Design and implementation of a secure wide-area object middleware. Computer Networks 51(10): 2484-2513 (2007)
2006
50 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers Springer 2006
49EEChandana Gamage, Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum: Security for the Mythical Air-Dropped Sensor Network. ISCC 2006: 41-47
48EEMelanie R. Rieback, Georgi Gaydadjiev, Bruno Crispo, Rutger F. H. Hofman, Andrew S. Tanenbaum: A Platform for RFID Security and Privacy Administration (Awarded Best Paper!). LISA 2006: 89-102
47EEMelanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum: Is Your Cat Infected with a Computer Virus?. PerCom 2006: 169-179
46EEPietro Mazzoleni, Elisa Bertino, Bruno Crispo: XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! SACMAT 2006: 219-227
45EEAndrew S. Tanenbaum, Chandana Gamage, Bruno Crispo: Taking Sensor Networks from the Lab to the Jungle. IEEE Computer 39(8): 98-100 (2006)
44EEMelanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum: The Evolution of RFID Security. IEEE Pervasive Computing 5(1): 62-69 (2006)
43EEMelanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum: RFID malware: truth vs. myth. IEEE Security & Privacy 4(4): 70-72 (2006)
42EEMelanie R. Rieback, Patrick N. D. Simpson, Bruno Crispo, Andrew S. Tanenbaum: RFID malware: Design principles and examples. Pervasive and Mobile Computing 2(4): 405-426 (2006)
2005
41 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers Springer 2005
40EEMelanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum: RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. ACISP 2005: 184-194
39EEKemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum: Counting Abuses Using Flexible Off-line Credentials. ACISP 2005: 548-559
38EESrijith Krishnan Nair, Bogdan C. Popescu, Chandana Gamage, Bruno Crispo, Andrew S. Tanenbaum: Enabling DRM-Preserving Digital Content Redistribution. CEC 2005: 151-158
37EEBruno Crispo, Swaminathan Sivasubramanian, Pietro Mazzoleni, Elisa Bertino: P-Hera: Scalable fine-grained access control for P2P infrastructures. ICPADS (1) 2005: 585-591
36EEPietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino: Efficient Integration of Fine-grained Access Control in Large-scale Grid Services. IEEE SCC 2005: 77-86
35EEBogdan C. Popescu, Maarten van Steen, Bruno Crispo, Andrew S. Tanenbaum, Jan Sacha, Ihor Kuz: Securely Replicated Web Documents. IPDPS 2005
34EEKemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum: How to incorporate revocation status information into the trust metrics for public-key certification. SAC 2005: 1594-1598
33EEMelanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum: Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags. Security Protocols Workshop 2005: 51-59
2004
32 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers Springer 2004
31EEBruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum: Symmetric Key Authentication Services Revisited. ACISP 2004: 248-261
30 Elisa Bertino, Bruno Crispo, Pietro Mazzoleni: Supporting Multi-Dimensional Trustworthiness for Grid Workflows. DELOS Workshop: Digital Library Architectures 2004: 195-204
29EEBogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Frank Kamperman: A DRM security architecture for home networks. Digital Rights Management Workshop 2004: 1-10
28EEElisa Bertino, Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elena Ferrari: Towards Supporting Fine-Grained Access Control for Grid Resources. FTDCS 2004: 59-65
27EEBogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum: Support for multi-level security policies in DRM architectures. NSPW 2004: 3-9
26EEElisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu: Security for grid-based computing systems issues and challenges. SACMAT 2004: 125
25EEBogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum: Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System. Security Protocols Workshop 2004: 213-220
2003
24 Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum: Secure Data Replication over Untrusted Hosts. HotOS 2003: 121-126
23EEBogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum: A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System. ISCC 2003: 225-231
22EEBogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Maas Zeeman: Enforcing Security Policies for Distributed Objects Applications. Security Protocols Workshop 2003: 119-130
2002
21 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers Springer 2002
20 Francesco Bergadano, Davide Cavagnino, Bruno Crispo: Individual Authentication in Multiparty Communications. Computers & Security 21(8): 719-735 (2002)
2001
19 Bruce Christianson, Bruno Crispo, Michael Roe: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers Springer 2001
18EEBruno Crispo, Giancarlo Ruffo: Reasoning about Accountability within Delegation. ICICS 2001: 251-260
17EEBruno Crispo: Delegation Protocols for Electronic Commerce. ISCC 2001: 674-679
2000
16 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings Springer 2000
15 Francesco Bergadano, Davide Cavagnino, Bruno Crispo: Individual Single Source Authentication on the MBone. IEEE International Conference on Multimedia and Expo (I) 2000: 541-544
14EEBruce Christianson, Bruno Crispo, James A. Malcolm: Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. Security Protocols Workshop 2000: 182-183
13EEFrancesco Bergadano, Davide Cavagnino, Bruno Crispo: Chained Stream Authentication. Selected Areas in Cryptography 2000: 144-157
12EEBruno Crispo, Peter Landrock, Václav Matyás Jr.: WWW security and trusted third party services. Future Generation Comp. Syst. 16(4): 331-341 (2000)
1999
11 Bruce Christianson, Bruno Crispo, William S. Harbison, Michael Roe: Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings Springer 1999
10 Francesco Bergadano, Davide Cavagnino, Bruno Crispo: Issues in Multicast Security. Security Protocols Workshop 1999: 119-139
1998
9 Bruce Christianson, Bruno Crispo, T. Mark A. Lomas, Michael Roe: Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings Springer 1998
8EEBruno Crispo: Delegation of Responsibility (Position Paper). Security Protocols Workshop 1998: 118-124
7EEBruno Crispo: Delegation of Responsibility (Transcript of Discussion). Security Protocols Workshop 1998: 125-130
6EEFrancesco Bergadano, Bruno Crispo, Giancarlo Ruffo: High Dictionary Compression for Proactive Password Checking. ACM Trans. Inf. Syst. Secur. 1(1): 3-25 (1998)
5 Ross J. Anderson, Francesco Bergadano, Bruno Crispo, Jong-Hyeon Lee, Charalampos Manifavas, Roger M. Needham: A New Family of Authentication Protocols. Operating Systems Review 32(4): 9-20 (1998)
1997
4EEFrancesco Bergadano, Bruno Crispo, Giancarlo Ruffo: Proactive Password Checking with Decision Trees. ACM Conference on Computer and Communications Security 1997: 67-77
3 Bruno Crispo: How to Build Evidence in a Public-Key Infrastructure for Multi-domain Environments. Security Protocols Workshop 1997: 53-65
2 Francesco Bergadano, Bruno Crispo, T. Mark A. Lomas: Strong Authentication and Privacy with Standard Browsers. Journal of Computer Security 5(3): 191-212 (1997)
1996
1 Bruno Crispo, T. Mark A. Lomas: A Certification Scheme for Electronic Commerce. Security Protocols Workshop 1996: 19-32

Coauthor Index

1Ross J. Anderson [5]
2Alessandro Artale [66]
3Arno Bakker [51]
4Roberto Battiti [61]
5Francesco Bergadano [2] [4] [5] [6] [10] [13] [15] [20]
6Elisa Bertino [26] [28] [30] [36] [37] [46] [59] [62]
7Kemal Bicakci [34] [39] [49]
8Damiano Bolzoni [54]
9Zhen Caoy [61]
10Roberto G. Cascella [61]
11Davide Cavagnino [10] [13] [15] [20]
12Bruce Christianson [9] [11] [14] [16] [19] [21] [32] [41] [50] [56]
13Muhammad Torabi Dashti [53]
14Theodosis Dimitrakos [52]
15Ivan Djordjevic [52]
16Boris Dragovic [55]
17Wengliang (Kevin) Du [26]
18Sandro Etalle [54]
19Elena Ferrari [28]
20Chandana Gamage [38] [45] [49]
21Georgi Gaydadjiev (Georgi Nedeltchev Gaydadjiev) [48]
22Mario Gerlay [61]
23Ron Gerrits [57]
24Gabriela Gheorghe [64]
25Fausto Giunchiglia [66]
26William S. Harbison [11]
27Amir Herzberg [65]
28Rutger F. H. Hofman [48]
29Iulia Ion [55]
30James Joshi [26]
31Frank Kamperman [29]
32Ihor Kuz [35]
33Peter Landrock [12]
34Jong-Hyeon Lee [5]
35T. Mark A. Lomas [1] [2] [9]
36James A. Malcolm [14] [16] [21] [32] [41] [50] [56]
37Charalampos Manifavas [5]
38Václav Matyás Jr. [12]
39Pietro Mazzoleni [28] [30] [36] [37] [46] [59] [62]
40Srijith Krishnan Nair (Srijith K. Nair) [38] [52] [53] [57] [58] [63] [64]
41Roger M. Needham [5]
42Bogdan C. Popescu [22] [23] [24] [25] [27] [29] [31] [35] [38] [51]
43Melanie R. Rieback [33] [40] [42] [43] [44] [47] [48]
44Michael Roe [9] [11] [16] [19] [21] [32] [41] [50] [56]
45Giancarlo Ruffo [4] [6] [18]
46Jan Sacha [35]
47Ravi S. Sandhu [26]
48Amitabh Saxena [65]
49Haya Shulman [65]
50Patrick N. D. Simpson [42] [58]
51Swaminathan Sivasubramanian [28] [36] [37] [59]
52Maarten van Steen [35]
53Andrew S. Tanenbaum [22] [23] [24] [25] [27] [29] [31] [33] [34] [35] [38] [39] [40] [42] [43] [44] [45] [47] [48] [49] [51] [53] [57] [58] [63] [64]
54Fatih Turkmen [60] [62]
55Maas Zeeman [22]
56Erik Zentveld [63]
57Rui Zhang [66]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)