Jonathan Anderson

Orcid: 0000-0002-7352-6463

According to our database1, Jonathan Anderson authored at least 39 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
UPSS: a User-centric Private Storage System with its applications.
CoRR, 2024

UPSS: A Global, Least-Privileged Storage System with Stronger Security and Better Performance.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
Blind Auditing and Probabilistic Access Controls.
Proceedings of the Security Protocols XXVIII, 2023

Evaluation of conformal-based probabilistic forecasting methods for short-term wind speed forecasting.
Proceedings of the Conformal and Probabilistic Prediction with Applications, 2023

2020
Building an awareness-centered information security policy compliance model.
Ind. Manag. Data Syst., 2020

2019
CapExec: Towards Transparently-Sandboxed Services (Extended Version).
CoRR, 2019

Challenges in Designing a Distributed Cryptographic File System (Transcript of Discussion).
Proceedings of the Security Protocols XXVII, 2019

Challenges in Designing a Distributed Cryptographic File System.
Proceedings of the Security Protocols XXVII, 2019

CapExec: Towards Transparently-Sandboxed Services.
Proceedings of the 15th International Conference on Network and Service Management, 2019

2017
Applying Provenance in APT Monitoring and Analysis: Practical Challenges for Scalable, Efficient and Trustworthy Distributed Provenance.
Proceedings of the 9th USENIX Workshop on the Theory and Practice of Provenance, 2017

2016
Fast Protection-Domain Crossing in the CHERI Capability-System Architecture.
IEEE Micro, 2016

Exploiting Autocorrect to Attack Privacy.
Proceedings of the Security Protocols XXIV, 2016

2015
Monitoring the Long-Term Degradation Behavior of Biomimetic Bioadhesive Using Wireless Magnetoelastic Sensor.
IEEE Trans. Biomed. Eng., 2015

CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Clean Application Compartmentalization with SOAAP.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
The CHERI capability model: Revisiting RISC in an age of risk.
Proceedings of the ACM/IEEE 41st International Symposium on Computer Architecture, 2014

TESLA: temporally enhanced system logic assertions.
Proceedings of the Ninth Eurosys Conference 2014, 2014

2013
Privacy engineering for social networks.
PhD thesis, 2013

Must Social Networking Conflict with Privacy?
IEEE Secur. Priv., 2013

Towards a Theory of Application Compartmentalisation.
Proceedings of the Security Protocols XXI, 2013

Declarative, Temporal, and Practical Programming with Capabilities.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
A taste of Capsicum: practical capabilities for UNIX.
Commun. ACM, 2012

Stayin' Alive: Aliveness as an Alternative to Authentication.
Proceedings of the Security Protocols XX, 2012

Stayin' Alive: Aliveness as an Alternative to Authentication (Transcript of Discussion).
Proceedings of the Security Protocols XX, 2012

2011
How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort).
Proceedings of the Security Protocols XIX, 2011

How to Keep Bad Papers Out of Conferences (Transcript of Discussion).
Proceedings of the Security Protocols XIX, 2011

2010
Introducing Capsicum: Practical Capabilities for UNIX.
login Usenix Mag., 2010

Inglorious Installers: Security in the Application Marketplace.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

Capsicum: Practical Capabilities for UNIX.
Proceedings of the 19th USENIX Security Symposium, 2010

On Storing Private Keys in the Cloud.
Proceedings of the Security Protocols XVIII, 2010

On Storing Private Keys in the Cloud (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

Effective UI - The Art of Building Great User Experience in Software.
O'Reilly, ISBN: 978-0-596-15478-3, 2010

2009
Not That Kind of Friend.
Proceedings of the Security Protocols XVII, 2009

Not That Kind of Friend.
Proceedings of the Security Protocols XVII, 2009

Privacy stories: confidence in privacy behaviors through end user programming.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Privacy suites: shared privacy for social networks.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Eight friends are enough: social graph approximation via public listings.
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 2009

Privacy-enabling social networking over untrusted networks.
Proceedings of the 2nd ACM Workshop on Online Social Networks, 2009

Prying Data out of a Social Network.
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009


  Loading...