Joan Feigenbaum
Joan Feigenbaum
Grace Murray Hopper Professor of Computer Science, Yale University
Verified email at - Homepage
Cited by
Cited by
Decentralized trust management
M Blaze, J Feigenbaum, J Lacy
Proceedings 1996 IEEE Symposium on Security and Privacy, 164-173, 1996
KeyNote: Trust management for public-key infrastructures
M Blaze, J Feigenbaum, AD Keromytis
International Workshop on Security Protocols, 59-63, 1998
The role of trust management in distributed systems security
M Blaze, J Feigenbaum, J Ioannidis, AD Keromytis
Secure Internet Programming, 185-210, 1999
The keynote trust management system version 2
M Blaze, J Feigenbaum, J Ioannidis, AD Keromytis
Internet RFC 2704, September, 1999
Sharing the cost of multicast transmissions
J Feigenbaum, CH Papadimitriou, S Shenker
Journal of computer and system sciences 63 (1), 21-41, 2001
Delegation logic: A logic-based approach to distributed authorization
N Li, BN Grosof, J Feigenbaum
ACM Transactions on Information and System Security (TISSEC) 6 (1), 128-171, 2003
A BGP-based mechanism for lowest-cost routing
J Feigenbaum, C Papadimitriou, R Sami, S Shenker
Distributed Computing 18 (1), 61-72, 2005
Information accountability
DJ Weitzner, H Abelson, T Berners-Lee, J Feigenbaum, J Hendler, ...
Communications of the ACM 51 (6), 82-87, 2008
Distributed algorithmic mechanism design: Recent results and future directions
J Feigenbaum, S Shenker
Current Trends in Theoretical Computer Science: The Challenge of the New …, 2004
REFEREE: Trust management for Web applications
YH Chu, J Feigenbaum, B LaMacchia, P Resnick, M Strauss
Computer Networks and ISDN systems 29 (8-13), 953-964, 1997
Compliance checking in the policymaker trust management system
M Blaze, J Feigenbaum, M Strauss
International Conference on Financial Cryptography, 254-274, 1998
On hiding information from an oracle
M Abadi, J Feigenbaum, J Kilian
Journal of computer and system sciences 39 (1), 21-50, 1989
On graph problems in a semi-streaming model
J Feigenbaum, S Kannan, A McGregor, S Suri, J Zhang
Theoretical Computer Science 348 (2-3), 207-216, 2005
An approximate L 1-difference algorithm for massive data streams
J Feigenbaum, S Kannan, MJ Strauss, M Viswanathan
SIAM Journal on Computing 32 (1), 131-151, 2002
Hiding instances in multioracle queries
D Beaver, J Feigenbaum
Annual Symposium on Theoretical Aspects of Computer Science, 37-48, 1990
Random-self-reducibility of complete sets
J Feigenbaum, L Fortnow
SIAM Journal on Computing 22 (5), 994-1005, 1993
Secure circuit evaluation
M Abadi, J Feigenbaum
Journal of Cryptology 2 (1), 1-12, 1990
A practically implementable and tractable delegation logic
N Li, B Grosof, J Feigenbaum
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 27-42, 2000
System/U: a database system based on the universal relation assumption
HF Korth, GM Kuper, J Feigenbaum, A Van Gelder, JD Ullman
ACM Transactions on Database Systems (TODS) 9 (3), 331-347, 1984
A logic-based knowledge representation for authorization with delegation
N Li, J Feigenbaum, BN Grosof
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 162-174, 1999
The system can't perform the operation now. Try again later.
Articles 1–20