Bob Blakley

Orcid: 0000-0001-8940-4789

Affiliations:
  • Tivoli Systems, Inc., Autstin, TX, USA
  • IBM Corporation, Austin, TX, USA
  • University of Michigan, Ann Arbor, MI, USA (PhD 1992)


According to our database1, Bob Blakley authored at least 27 papers between 1978 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A 20th Anniversary Episode Chat With S&P Editors George Cybenko, Carl Landwehr, Shari Lawrence Pfleeger, and Sean Peisert.
IEEE Secur. Priv., 2023

Katie Moussouris: Vulnerability Disclosure and Security Workforce Development.
IEEE Secur. Priv., 2023

2022
High Assurance in the Twenty-First Century With Roger Schell.
IEEE Secur. Priv., 2022

2021
A Discussion of Election Security, Cryptography, and Exceptional Access With Michael Alan Specter.
IEEE Secur. Priv., 2021

A Discussion of Public Health, Trust, and Privacy With Susan Landau.
IEEE Secur. Priv., 2021

2018
Shifting Paradigms: Using Strategic Foresight to Plan for Security Evolution.
Proceedings of the New Security Paradigms Workshop, 2018

2014
How to Draw Graphs: Seeing and Redrafting Large Networks in Security and Biology.
CoRR, 2014

Polymorphism as a Defense for Automated Attack of Websites.
Proceedings of the Applied Cryptography and Network Security, 2014

2012
Are You Smarter than the TSA? (Hint: No).
IEEE Secur. Priv., 2012

2008
Information Assurance Technology Forecast 2008.
IEEE Secur. Priv., 2008

2005
All Sail, No Anchor III: Risk Aggregation and Time's Arrow.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
All sail, no anchor II: Acceptable high-end PKI.
Int. J. Inf. Sec., 2004

2002
Security Insights.
Comput. Secur., 2002

Assuring critical systems.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002

2001
Information security is information risk management.
Proceedings of the New Security Paradigms Workshop 2001, 2001

2000
Access Control Requirements for LDAP.
RFC, May, 2000

All Sail, No Anchor, 1: Cryptography, Risk, and e-Commerce.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
A Resource Access Decision Service for CORBA-Based Distributed Systems.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Le Nozze di Nomen.
Proceedings of the Network and Distributed System Security Symposium, 1998

1997
Some weaknesses of the TCB model.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

1996
Approach to Object Security in Distributed SOM.
IBM Syst. J., 1996

The Emperor's old armor.
Proceedings of the 1996 Workshop on New Security Paradigms, 1996

1992
A Smalltalk evolving algebra and its uses.
PhD thesis, 1992

Threshold Schemes with Disenrollment.
Proceedings of the Advances in Cryptology, 1992

1979
Security of Number Theoretic Public Key Cryptosystems against Random Attack, III.
Cryptologia, 1979

Security of Number Theoretic Public Key Cryptosystems against Random Attack, II.
Cryptologia, 1979

1978
Security of Number Theoretic Public Key Cryptosystems against Random Attack, I.
Cryptologia, 1978


  Loading...