Decentralized trust management M Blaze, J Feigenbaum, J Lacy Proceedings 1996 IEEE symposium on security and privacy, 164-173, 1996 | 3459 | 1996 |
KeyNote: Trust Management for Public-Key Infrastructures: Position Paper M Blaze, J Feigenbaum, AD Keromytis Security Protocols: 6th International Workshop Cambridge, UK, April 15–17 …, 1999 | 973 | 1999 |
The role of trust management in distributed systems security M Blaze, J Feigenbaum, J Ioannidis, AD Keromytis Secure Internet programming: security issues for mobile and distributed …, 1999 | 770 | 1999 |
The KeyNote trust-management system version 2 M Blaze, J Feigenbaum, J Ioannidis, A Keromytis | 750 | 1999 |
Sharing the cost of muliticast transmissions (preliminary version) J Feigenbaum, C Papadimitriou, S Shenker Proceedings of the thirty-second annual ACM symposium on Theory of computing …, 2000 | 602 | 2000 |
Delegation logic: A logic-based approach to distributed authorization N Li, BN Grosof, J Feigenbaum ACM Transactions on Information and System Security (TISSEC) 6 (1), 128-171, 2003 | 601 | 2003 |
Information accountability DJ Weitzner, H Abelson, T Berners-Lee, J Feigenbaum, J Hendler, ... Communications of the ACM 51 (6), 82-87, 2008 | 587 | 2008 |
A BGP-based mechanism for lowest-cost routing J Feigenbaum, C Papadimitriou, R Sami, S Shenker Proceedings of the twenty-first annual symposium on Principles of …, 2002 | 545 | 2002 |
Distributed algorithmic mechanism design: Recent results and future directions J Feigenbaum, S Shenker Current Trends in Theoretical Computer Science: The Challenge of the New …, 2004 | 539 | 2004 |
REFEREE: Trust management for Web applications YH Chu, J Feigenbaum, B LaMacchia, P Resnick, M Strauss Computer Networks and ISDN systems 29 (8-13), 953-964, 1997 | 509 | 1997 |
On graph problems in a semi-streaming model J Feigenbaum, S Kannan, A McGregor, S Suri, J Zhang Theoretical Computer Science 348 (2-3), 207-216, 2005 | 447 | 2005 |
Compliance checking in the policymaker trust management system M Blaze, J Feigenbaum, M Strauss Financial Cryptography: Second International Conference, FC'98 Anguilla …, 1998 | 402 | 1998 |
On hiding information from an oracle M Abadi, J Feigenbaum, J Kilian Proceedings of the nineteenth annual ACM symposium on Theory of computing …, 1987 | 392 | 1987 |
An approximate L 1-difference algorithm for massive data streams J Feigenbaum, S Kannan, MJ Strauss, M Viswanathan SIAM Journal on Computing 32 (1), 131-151, 2002 | 342 | 2002 |
Hiding instances in multioracle queries D Beaver, J Feigenbaum Annual Symposium on Theoretical Aspects of Computer Science, 37-48, 1990 | 311 | 1990 |
Random-self-reducibility of complete sets J Feigenbaum, L Fortnow SIAM Journal on Computing 22 (5), 994-1005, 1993 | 248 | 1993 |
Secure circuit evaluation: A protocol based on hiding information from an oracle M Abadi, J Feigenbaum Journal of Cryptology 2, 1-12, 1990 | 210 | 1990 |
Probabilistic analysis of onion routing in a black-box model J Feigenbaum, A Johnson, P Syverson ACM Transactions on Information and System Security (TISSEC) 15 (3), 1-28, 2012 | 168 | 2012 |
System/U: a database system based on the universal relation assumption HF Korth, GM Kuper, J Feigenbaum, A Van Gelder, JD Ullman ACM Transactions on Database Systems (TODS) 9 (3), 331-347, 1984 | 166 | 1984 |
A practically implementable and tractable delegation logic N Li, B Grosof, J Feigenbaum Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 27-42, 2000 | 158 | 2000 |