Matthew Burnside

Affiliations:
  • Columbia University, New York City, USA


According to our database1, Matthew Burnside authored at least 15 papers between 2002 and 2013.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2013
Analyzing Network Traffic with Chimera.
login Usenix Mag., 2013

2012
Chimera: A Declarative Language for Streaming Network Traffic Analysis.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

2009
Pushing Boulders Uphill: The Difficulty of Network Intrusion Recovery.
Proceedings of the 23rd Large Installation System Administration Conference, 2009

F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services.
Proceedings of the Information Security, 12th International Conference, 2009

2008
Authentication on Untrusted Remote Hosts with Public-Key Sudo.
Proceedings of the 22nd Large Installation System Administration Conference, 2008

Online Network Forensics for Automatic Repair Validation.
Proceedings of the Advances in Information and Computer Security, 2008

Path-Based Access Control for Enterprise Networks.
Proceedings of the Information Security, 11th International Conference, 2008

Asynchronous policy evaluation and enforcement.
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, 2008

2006
Cryptography as an operating system service: A case study.
ACM Trans. Comput. Syst., 2006

Low Latency Anonymity with Mix Rings.
Proceedings of the Information Security, 9th International Conference, 2006

2005
The case for crypto protocol awareness inside the OS kernel.
SIGARCH Comput. Archit. News, 2005

2004
Access-controlled resource discovery in pervasive networks.
Concurr. Pract. Exp., 2004

2003
Accelerating application-level security protocols.
Proceedings of the 11th IEEE International Conference on Networks, 2003

2002
Proxy-based security protocols in networked mobile devices.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

The Untrusted Computer Problem and Camera-Based Authentication.
Proceedings of the Pervasive Computing, 2002


  Loading...