Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

World Wide Web Without Walls., , , , and . HotNets, ACM SIGCOMM, (2007)Middleboxes No Longer Considered Harmful., , , , , and . OSDI, page 215-230. USENIX Association, (2004)Building Secure High-Performance Web Services with OKWS.. USENIX Annual Technical Conference, General Track, page 185-198. USENIX, (2004)Events Can Make Sense., , and . USENIX Annual Technical Conference, page 87-100. USENIX, (2007)Noninterference for a Practical DIFC-Based Operating System., and . IEEE Symposium on Security and Privacy, page 61-76. IEEE Computer Society, (2009)Proactive Two-Party Signatures for User Authentication., , , and . NDSS, The Internet Society, (2003)Make Least Privilege a Right (Not a Privilege)., , , , , , , , , and . HotOS, USENIX Association, (2005)SPATE: Small-Group PKI-Less Authenticated Trust Establishment., , , , , , , , , and 3 other author(s). IEEE Trans. Mob. Comput., 9 (12): 1666-1681 (2010)Labels and event processes in the Asbestos operating system., , , , , , , , and . SOSP, page 17-30. ACM, (2005)Privacy-preserving browser-side scripting with BFlow., , , and . EuroSys, page 233-246. ACM, (2009)