Author image not provided
 Jason E Holt

Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article27.00
Citation Count135
Publication count5
Publication years2003-2006
Available for download4
Average downloads per article864.00
Downloads (cumulative)3,456
Downloads (12 Months)58
Downloads (6 Weeks)8
Arrow RightAuthor only

See all colleagues of this author

See all subject areas


5 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 5 of 5
Sort by:

January 2006 ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Publisher: Australian Computer Society, Inc.
Citation Count: 19
Downloads (6 Weeks): 2,   Downloads (12 Months): 24,   Downloads (Overall): 235

Full text available: PDFPDF
Logcrypt provides strong cryptographic assurances that data stored by a logging facility before a system compromise cannot be modified after the compromise without detection. We build on prior work by showing how log creation can be separated from log verification, and describing several additional performance and convenience features not previously ...

2 published by ACM
October 2004 CCS '04: Proceedings of the 11th ACM conference on Computer and communications security
Publisher: ACM
Citation Count: 52
Downloads (6 Weeks): 1,   Downloads (12 Months): 12,   Downloads (Overall): 794

Full text available: PDFPDF
Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing hidden credentials using Boneh/Franklin Identity Based Encryption. We also propose a substantially improved secret splitting scheme for enforcing complex policies, and show how it improves concealment of policies from ...
Keywords: credentials, identity based encryption, trust negotiation, authentication, privacy, secret sharing

3 published by ACM
August 2004 ACM Transactions on Information and System Security (TISSEC): Volume 7 Issue 3, August 2004
Publisher: ACM
Citation Count: 7
Downloads (6 Weeks): 4,   Downloads (12 Months): 12,   Downloads (Overall): 1,868

Full text available: PDFPDF
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resources. The set of resources is usually static, and an access control policy associated with each resource specifies who is authorized to access the ...
Keywords: access control, Trust negotiation, authentication, credentials

4 published by ACM
October 2003 WPES '03: Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Publisher: ACM
Citation Count: 57
Downloads (6 Weeks): 1,   Downloads (12 Months): 10,   Downloads (Overall): 559

Full text available: PDFPDF
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend on fulfillment of policies described by monotonic boolean formulae can take place in a single round of messages. We further show how credentials that are never ...
Keywords: credentials, identity based encryption, trust negotiation, authentication, privacy

July 2003 IEEE Security and Privacy: Volume 1 Issue 4, July 2003
Publisher: IEEE Educational Activities Department
Citation Count: 0

Attendees report onthe IEEE Symposium on Security and Privacy and the Almaden Institute Symposium on Privacy. Speakers from various affiliations discussed everything from mechanical locks to privacy policies.

The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us