Author image not provided
 Matthew Burnside

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article3.60
Citation Count54
Publication count15
Publication years2002-2012
Available for download6
Average downloads per article1,099.67
Downloads (cumulative)6,598
Downloads (12 Months)80
Downloads (6 Weeks)13
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


15 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 15 of 15
Sort by:

1
August 2012 Security'12: Proceedings of the 21st USENIX conference on Security symposium
Publisher: USENIX Association
Bibliometrics:
Citation Count: 5

Intrusion detection systems play a vital role in network security. Central to these systems is the language used to express policies. Ideally, this language should be powerful, implementation-agnostic, and cross-platform. Unfortunately, today's popular intrusion detection systems fall short of this goal. Each has their own policy language in which expressing ...

2
November 2009 LISA'09: Proceedings of the 23rd conference on Large installation system administration
Publisher: USENIX Association
Bibliometrics:
Citation Count: 1

One of the most significant unsolved problems for network managers and system administrators is how to repair a network infrastructure after discovering evidence of an extensive compromise. The technical issues are compounded by a breathtaking variety of human factors. We present a study of three significant compromises of a medium-scale ...

3
September 2009 ISC '09: Proceedings of the 12th International Conference on Information Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users' trust, voluntary or not, in the ability of third parties to protect their sensitive data is often unfounded. Data may be exposed anywhere along a corporation's web pipeline, from the ...

4
November 2008 IWSEC '08: Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Automated intrusion prevention and self-healing software are active areas of security systems research. A major hurdle for the widespread deployment of these systems is that many system administrators lack confidence in the quality of the generated fixes. Thus, a key requirement for future self-healing software is that each automatically-generated fix ...
Keywords: automatic repair validation, software self-healing

5
November 2008 LISA'08: Proceedings of the 22nd conference on Large installation system administration conference
Publisher: USENIX Association
Bibliometrics:
Citation Count: 0

Two common tools in Linux- and UNIX-based environments are SSH for secure communications and sudo for performing administrative tasks. These are independent programs with substantially different purposes, but they are often used in conjunction. In this paper, we describe a weakness in their interaction and present our solution, public-key sudo. ...

6 published by ACM
October 2008 CSAW '08: Proceedings of the 2nd ACM workshop on Computer security architectures
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 8,   Downloads (Overall): 189

Full text available: PdfPdf
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions are limited by an out-of-date allow/deny paradigm, and policies are evaluated synchronously and independently at each service. This makes it difficult to detect or defend against ...
Keywords: scalability, access control, policy, security

7
September 2008 ISC '08: Proceedings of the 11th international conference on Information Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

Enterprise networks are ubiquitious and increasingly complex. The mechanisms for defining security policies in these networks have not kept up with the advancements in networking technology. In most cases, system administrators define policies on a per-application basis, and subsequently, these policies do not interact. For example, there is no mechanism ...
Keywords: access control, Keynote, Path-based, enterprise, SOA

8
August 2006 ISC'06: Proceedings of the 9th international conference on Information Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 4

We introduce mix rings , a novel peer-to-peer mixnet architecture for anonymity that yields low-latency networking compared to existing mixnet architectures. A mix ring is a cycle of continuous-time mixes that uses carefully coordinated cover traffic and a simple fan-out mechanism to protect the initiator from timing analysis attacks. Key ...

9 published by ACM
February 2006 ACM Transactions on Computer Systems (TOCS): Volume 24 Issue 1, February 2006
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 7,   Downloads (12 Months): 43,   Downloads (Overall): 3,245

Full text available: PDFPDF
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator cards. However, until now no operating system provided a mechanism that allowed both uniform and efficient use of this new type of resource.We present the OpenBSD Cryptographic Framework (OCF), ...
Keywords: digital signatures, Encryption, authentication, cryptographic protocols, hash functions

10 published by ACM
March 2005 ACM SIGARCH Computer Architecture News - Special issue: Workshop on architectural support for security and anti-virus (WASSA): Volume 33 Issue 1, March 2005
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 2,   Downloads (Overall): 279

Full text available: PDFPDF
Separation of control and data plane is a principle increasingly used to improve the performance of network protocols and applications, such as the Web. Use of security mechanisms, such as the SSL/TLS protocol, can negate these performance gains, since such mechanisms need to be located on the data path. We ...

11
September 2004 Concurrency and Computation: Practice & Experience - Computer Security: Volume 16 Issue 11, September 2004
Publisher: John Wiley and Sons Ltd.
Bibliometrics:
Citation Count: 0

Networks of the future will be characterized by a variety of computational devices that display a level of dynamism not seen in traditional wired networks. Because of the dynamic nature of these networks, resource discovery is one of the fundamental problems that must be solved. While resource discovery systems are ...
Keywords: access control, access control list, pervasive computing, intentional naming network, public key infrastructure

12 published by ACM
August 2003 NICELI '03: Proceedings of the ACM SIGCOMM workshop on Network-I/O convergence: experience, lessons, implications
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 0,   Downloads (12 Months): 5,   Downloads (Overall): 1,127

Full text available: PDFPDF
The design of modern operating systems is based around the concept of memory as a cache for data that flows between applications, storage, and I/O devices. With the increasing disparity between I/O bandwidth and CPU performance, this architecture exposes the processor and memory subsystems as the bottlenecks to system performance. ...
Keywords: Data Streaming, Operating Systems, Architecture

13 published by ACM
March 2003 SAC '03: Proceedings of the 2003 ACM symposium on Applied computing
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 1,   Downloads (12 Months): 7,   Downloads (Overall): 266

Full text available: PDFPDF
Networks of the future will be characterized by a variety of computational devices that display a level of dynamism not seen in traditional wired networks. Because of the dynamic nature of these networks, resource discovery is one of the fundamental problems that must be faced. While resource discovery systems are ...
Keywords: certificate, mobile device, proxy, security, authorization, pervasive, protocol, ubiquitous

14
August 2002 Pervasive '02: Proceedings of the First International Conference on Pervasive Computing
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 13

The use of computers in public places is increasingly common in everyday life. In using one of these computers, a user is trusting it to correctly carry out her orders. For many transactions, particularly banking operations, blind trust in a public terminal will not satisfy most users. In this paper ...

15 published by ACM
March 2002 SAC '02: Proceedings of the 2002 ACM symposium on Applied computing
Publisher: ACM
Bibliometrics:
Citation Count: 22
Downloads (6 Weeks): 1,   Downloads (12 Months): 15,   Downloads (Overall): 1,492

Full text available: PDFPDF
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and users have associated trusted software proxies that either run on the appliance hardware or on a trusted computer. We describe how security and privacy are ...
Keywords: authorization, certificate chain discovery, pervasive, protocol, ubiquitous, wireless, certificate, certificate chain, mobile device, proxy, security



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us