Joan Feigenbaum
Joan Feigenbaum
Grace Murray Hopper Professor of Computer Science, Yale University
Verified email at - Homepage
Cited by
Cited by
Decentralized trust management
M Blaze, J Feigenbaum, J Lacy
Proceedings 1996 IEEE symposium on security and privacy, 164-173, 1996
KeyNote: Trust Management for Public-Key Infrastructures: Position Paper
M Blaze, J Feigenbaum, AD Keromytis
Security Protocols: 6th International Workshop Cambridge, UK, April 15–17 …, 1999
The role of trust management in distributed systems security
M Blaze, J Feigenbaum, J Ioannidis, AD Keromytis
Secure Internet programming: security issues for mobile and distributed …, 1999
The KeyNote trust-management system version 2
M Blaze, J Feigenbaum, J Ioannidis, A Keromytis
Sharing the cost of muliticast transmissions (preliminary version)
J Feigenbaum, C Papadimitriou, S Shenker
Proceedings of the thirty-second annual ACM symposium on Theory of computing …, 2000
Delegation logic: A logic-based approach to distributed authorization
N Li, BN Grosof, J Feigenbaum
ACM Transactions on Information and System Security (TISSEC) 6 (1), 128-171, 2003
Information accountability
DJ Weitzner, H Abelson, T Berners-Lee, J Feigenbaum, J Hendler, ...
Communications of the ACM 51 (6), 82-87, 2008
A BGP-based mechanism for lowest-cost routing
J Feigenbaum, C Papadimitriou, R Sami, S Shenker
Proceedings of the twenty-first annual symposium on Principles of …, 2002
Distributed algorithmic mechanism design: Recent results and future directions
J Feigenbaum, S Shenker
Current Trends in Theoretical Computer Science: The Challenge of the New …, 2004
REFEREE: Trust management for Web applications
YH Chu, J Feigenbaum, B LaMacchia, P Resnick, M Strauss
Computer Networks and ISDN systems 29 (8-13), 953-964, 1997
On graph problems in a semi-streaming model
J Feigenbaum, S Kannan, A McGregor, S Suri, J Zhang
Theoretical Computer Science 348 (2-3), 207-216, 2005
Compliance checking in the policymaker trust management system
M Blaze, J Feigenbaum, M Strauss
Financial Cryptography: Second International Conference, FC'98 Anguilla …, 1998
On hiding information from an oracle
M Abadi, J Feigenbaum, J Kilian
Proceedings of the nineteenth annual ACM symposium on Theory of computing …, 1987
An approximate L 1-difference algorithm for massive data streams
J Feigenbaum, S Kannan, MJ Strauss, M Viswanathan
SIAM Journal on Computing 32 (1), 131-151, 2002
Hiding instances in multioracle queries
D Beaver, J Feigenbaum
Annual Symposium on Theoretical Aspects of Computer Science, 37-48, 1990
Random-self-reducibility of complete sets
J Feigenbaum, L Fortnow
SIAM Journal on Computing 22 (5), 994-1005, 1993
Secure circuit evaluation: A protocol based on hiding information from an oracle
M Abadi, J Feigenbaum
Journal of Cryptology 2, 1-12, 1990
Probabilistic analysis of onion routing in a black-box model
J Feigenbaum, A Johnson, P Syverson
ACM Transactions on Information and System Security (TISSEC) 15 (3), 1-28, 2012
System/U: a database system based on the universal relation assumption
HF Korth, GM Kuper, J Feigenbaum, A Van Gelder, JD Ullman
ACM Transactions on Database Systems (TODS) 9 (3), 331-347, 1984
A practically implementable and tractable delegation logic
N Li, B Grosof, J Feigenbaum
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 27-42, 2000
The system can't perform the operation now. Try again later.
Articles 1–20