Maxwell N. Krohn

According to our database1, Maxwell N. Krohn authored at least 15 papers between 2003 and 2010.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
SPATE: Small-Group PKI-Less Authenticated Trust Establishment.
IEEE Trans. Mob. Comput., 2010

2009
Noninterference for a Practical DIFC-Based Operating System.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

SPATE: small-group PKI-less authenticated trust establishment.
Proceedings of the 7th International Conference on Mobile Systems, 2009

Privacy-preserving browser-side scripting with BFlow.
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, 2009

2008
Information flow control for secure web sites.
PhD thesis, 2008

2007
Labels and event processes in the Asbestos operating system.
ACM Trans. Comput. Syst., 2007

Events Can Make Sense.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

Information flow control for standard OS abstractions.
Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, 2007

World Wide Web Without Walls.
Proceedings of the 6th ACM Workshop on Hot Topics in Networks, 2007

2005
Make Least Privilege a Right (Not a Privilege).
Proceedings of HotOS'05: 10th Workshop on Hot Topics in Operating Systems, 2005

2004
Building Secure High-Performance Web Services with OKWS.
Proceedings of the General Track: 2004 USENIX Annual Technical Conference, June 27, 2004

On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

Middleboxes No Longer Considered Harmful.
Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004), 2004

Secure Untrusted Data Repository (SUNDR).
Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004), 2004

2003
Proactive Two-Party Signatures for User Authentication.
Proceedings of the Network and Distributed System Security Symposium, 2003


  Loading...