Jeremy Epstein

Orcid: 0000-0003-2258-3764

According to our database1, Jeremy Epstein authored at least 35 papers between 1990 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
A Horse's Rump and Cybersecurity.
IEEE Secur. Priv., 2019

2018
Cybersecurity and Privacy Issues in Brazil: Back, Now, and Then [Guest Editors' Introduction].
IEEE Secur. Priv., 2018

2017
Privacy is Context Dependent.
IEEE Secur. Priv., 2017

An NSF View of Multimedia Privacy and Security: Extended Abstract.
Proceedings of the 2017 on Multimedia Privacy and Security, 2017

2016
Reflections of an NSF Program Officer.
IEEE Secur. Priv., 2016

2015
Weakness in Depth: A Voting Machine's Demise.
IEEE Secur. Priv., 2015

The Whole Is Less than the Sum of the Parts.
IEEE Secur. Priv., 2015

2014
Phishing Our Employees.
IEEE Secur. Priv., 2014

Panel Summary: The Future of Software Regulation.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014

2013
Are All Types of Internet Voting Unsafe?
IEEE Secur. Priv., 2013

2012
Lost Treasures.
IEEE Secur. Priv., 2012

Reflecting on Some Past Predictions.
IEEE Secur. Priv., 2012

Can We Be Too Careful?
IEEE Secur. Priv., 2012

2011
Applying a Reusable Election Threat Model at the County Level.
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011

2009
A Survey of Vendor Software Assurance Practices.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Security Lessons Learned from Société Générale.
IEEE Secur. Priv., 2008

Information Assurance Technology Forecast 2008.
IEEE Secur. Priv., 2008

2007
Electronic Voting.
Computer, 2007

2006
Why applying standards to Web services is not enough.
IEEE Secur. Priv., 2006

Software Security and SOA: Danger, Will Robinson!
IEEE Secur. Priv., 2006

Fifteen Years after TX: A Look Back at High Assurance Multi-Level Secure Windowing.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2000
Using Operating System Wrappers to Increase the Resiliency to Commercial Firewalls.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
Architecture and Concepts of the ARGuE Guard.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1997
HCI at Trilogy: Bringing the Design Stance to a Startup.
Proceedings of the Human Factors in Computing Systems, 1997

1996
Using Fortezza For Transparent File Encryption.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

1995
NetWare 4 as an example of role-based access control.
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995

1994
Editorial: a view of cryptography in TCSEC products.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

1993
A High Assurance Window System Prototype.
J. Comput. Secur., 1993

User interface for a high assurance, windowing system.
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993

1992
Virtual Window Systems: A New Approach to Supporting Concurrent Heterogeneous Windowing Systems.
Proceedings of the USENIX Summer 1992 Technical Conference, 1992

Evolution of a trusted B3 window system prototype.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

A comparison of trusted X security policies, architectures, and interoperability.
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992

1991
A prototype B3 trusted X Window System.
Proceedings of the Seventh Annual Computer Security Applications Conference, 1991

1990
A Trusted X Window System Server for Trusted Mach.
Proceedings of the USENIX MACH Symposium, Burlington, VT, USA, 4-5 October 1990, 1990

A prototype for Trusted X labeling policies.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990


  Loading...