Follow
Joan Feigenbaum
Joan Feigenbaum
Grace Murray Hopper Professor of Computer Science, Yale University
Verified email at yale.edu - Homepage
Title
Cited by
Cited by
Year
Decentralized trust management
M Blaze, J Feigenbaum, J Lacy
Proceedings 1996 IEEE symposium on security and privacy, 164-173, 1996
33761996
KeyNote: Trust management for public-key infrastructures
M Blaze, J Feigenbaum, AD Keromytis
International Workshop on Security Protocols, 59-63, 1998
9551998
The role of trust management in distributed systems security
M Blaze, J Feigenbaum, J Ioannidis, AD Keromytis
Secure Internet Programming, 185-210, 1999
7561999
The KeyNote trust-management system version 2
M Blaze, J Feigenbaum, J Ioannidis, A Keromytis
7241999
Sharing the cost of muliticast transmissions (preliminary version)
J Feigenbaum, C Papadimitriou, S Shenker
Proceedings of the thirty-second annual ACM symposium on Theory of computing …, 2000
5832000
Delegation logic: A logic-based approach to distributed authorization
N Li, BN Grosof, J Feigenbaum
ACM Transactions on Information and System Security (TISSEC) 6 (1), 128-171, 2003
5822003
Information accountability
DJ Weitzner, H Abelson, T Berners-Lee, J Feigenbaum, J Hendler, ...
Communications of the ACM 51 (6), 82-87, 2008
5552008
A BGP-based mechanism for lowest-cost routing
J Feigenbaum, C Papadimitriou, R Sami, S Shenker
Proceedings of the twenty-first annual symposium on Principles of …, 2002
5342002
Distributed algorithmic mechanism design: Recent results and future directions
J Feigenbaum, S Shenker
Current Trends in Theoretical Computer Science: The Challenge of the New …, 2004
5312004
REFEREE: Trust management for Web applications
YH Chu, J Feigenbaum, B LaMacchia, P Resnick, M Strauss
Computer Networks and ISDN systems 29 (8-13), 953-964, 1997
4911997
Compliance checking in the policymaker trust management system
M Blaze, J Feigenbaum, M Strauss
International Conference on Financial Cryptography, 254-274, 1998
3981998
On graph problems in a semi-streaming model
J Feigenbaum, S Kannan, A McGregor, S Suri, J Zhang
Theoretical Computer Science 348 (2-3), 207-216, 2005
3952005
On hiding information from an oracle
M Abadi, J Feigenbaum, J Kilian
Proceedings of the nineteenth annual ACM symposium on Theory of computing …, 1987
3901987
An approximate L 1-difference algorithm for massive data streams
J Feigenbaum, S Kannan, MJ Strauss, M Viswanathan
SIAM Journal on Computing 32 (1), 131-151, 2002
3342002
Hiding instances in multioracle queries
D Beaver, J Feigenbaum
Annual Symposium on Theoretical Aspects of Computer Science, 37-48, 1990
3081990
Random-self-reducibility of complete sets
J Feigenbaum, L Fortnow
SIAM Journal on Computing 22 (5), 994-1005, 1993
2231993
Secure circuit evaluation
M Abadi, J Feigenbaum
Journal of Cryptology 2 (1), 1-12, 1990
2041990
A practically implementable and tractable delegation logic
N Li, B Grosof, J Feigenbaum
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 27-42, 2000
1632000
System/U: a database system based on the universal relation assumption
HF Korth, GM Kuper, J Feigenbaum, A Van Gelder, JD Ullman
ACM Transactions on Database Systems (TODS) 9 (3), 331-347, 1984
1561984
A logic-based knowledge representation for authorization with delegation
N Li, J Feigenbaum, BN Grosof
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 162-174, 1999
1471999
The system can't perform the operation now. Try again later.
Articles 1–20