default search action
Jonathan Anderson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c29]Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson:
UPSS: A Global, Least-Privileged Storage System with Stronger Security and Better Performance. ICISSP 2024: 660-671 - [i2]Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson:
UPSS: a User-centric Private Storage System with its applications. CoRR abs/2403.15884 (2024) - 2023
- [c28]Simon Althoff, Johan Hallberg Szabadv'ary, Jonathan Anderson, Lars Carlsson:
Evaluation of conformal-based probabilistic forecasting methods for short-term wind speed forecasting. COPA 2023: 100-115 - [c27]Arastoo Bozorgi, Jonathan Anderson:
Blind Auditing and Probabilistic Access Controls. Security Protocols Workshop 2023: 257-269 - [e9]Frank Stajano, Vashek Matyás, Bruce Christianson, Jonathan Anderson:
Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers. Lecture Notes in Computer Science 14186, Springer 2023, ISBN 978-3-031-43032-9 [contents] - 2020
- [j6]Alex Koohang, Jonathan Anderson, Jeretta Horn Nord, Joanna Paliszkiewicz:
Building an awareness-centered information security policy compliance model. Ind. Manag. Data Syst. 120(1): 231-247 (2020) - [e8]Jonathan Anderson, Frank Stajano, Bruce Christianson, Vashek Matyás:
Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12287, Springer 2020, ISBN 978-3-030-57042-2 [contents]
2010 – 2019
- 2019
- [c26]Mahya Soleimani Jadidi, Mariusz Zaborski, Brian J. Kidney, Jonathan Anderson:
CapExec: Towards Transparently-Sandboxed Services. CNSM 2019: 1-5 - [c25]Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson:
Challenges in Designing a Distributed Cryptographic File System. Security Protocols Workshop 2019: 177-192 - [c24]Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson:
Challenges in Designing a Distributed Cryptographic File System (Transcript of Discussion). Security Protocols Workshop 2019: 193-199 - [i1]Mahya Soleimani Jadidi, Mariusz Zaborski, Brian J. Kidney, Jonathan Anderson:
CapExec: Towards Transparently-Sandboxed Services (Extended Version). CoRR abs/1909.12282 (2019) - 2018
- [e7]Vashek Matyás, Petr Svenda, Frank Stajano, Bruce Christianson, Jonathan Anderson:
Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11286, Springer 2018, ISBN 978-3-030-03250-0 [contents] - 2017
- [c23]Graeme Jenkinson, Lucian Carata, Thomas Bytheway, Ripduman Sohan, Robert N. M. Watson, Jonathan Anderson, Brian J. Kidney, Amanda Strnad, Arun Thomas, George V. Neville-Neil:
Applying Provenance in APT Monitoring and Analysis: Practical Challenges for Scalable, Efficient and Trustworthy Distributed Provenance. TaPP 2017 - [e6]Jonathan Anderson, Vashek Matyás, Bruce Christianson, Frank Stajano:
Security Protocols XXIV - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10368, Springer 2017, ISBN 978-3-319-62032-9 [contents] - [e5]Frank Stajano, Jonathan Anderson, Bruce Christianson, Vashek Matyás:
Security Protocols XXV - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10476, Springer 2017, ISBN 978-3-319-71074-7 [contents] - 2016
- [j5]Robert N. M. Watson, Robert M. Norton, Jonathan Woodruff, Simon W. Moore, Peter G. Neumann, Jonathan Anderson, David Chisnall, Brooks Davis, Ben Laurie, Michael Roe, Nirav H. Dave, Khilan Gudka, Alexandre Joannou, A. Theodore Markettos, Ed Maste, Steven J. Murdoch, Colin Rothwell, Stacey D. Son, Munraj Vadera:
Fast Protection-Domain Crossing in the CHERI Capability-System Architecture. IEEE Micro 36(5): 38-49 (2016) - [c22]Brian J. Kidney, Jonathan Anderson:
Exploiting Autocorrect to Attack Privacy. Security Protocols Workshop 2016: 103-109 - 2015
- [j4]Meng-Hsien Lin, Jonathan Anderson, Rattapol Pinnaratip, Hao Meng, Shari Konst, Andrew J. DeRouin, Rupak M. Rajachar, Keat Ghee Ong, Bruce P. Lee:
Monitoring the Long-Term Degradation Behavior of Biomimetic Bioadhesive Using Wireless Magnetoelastic Sensor. IEEE Trans. Biomed. Eng. 62(7): 1838-1842 (2015) - [c21]Khilan Gudka, Robert N. M. Watson, Jonathan Anderson, David Chisnall, Brooks Davis, Ben Laurie, Ilias Marinos, Peter G. Neumann, Alex Richardson:
Clean Application Compartmentalization with SOAAP. CCS 2015: 1016-1031 - [c20]Robert N. M. Watson, Jonathan Woodruff, Peter G. Neumann, Simon W. Moore, Jonathan Anderson, David Chisnall, Nirav H. Dave, Brooks Davis, Khilan Gudka, Ben Laurie, Steven J. Murdoch, Robert M. Norton, Michael Roe, Stacey D. Son, Munraj Vadera:
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization. IEEE Symposium on Security and Privacy 2015: 20-37 - [e4]Bruce Christianson, Petr Svenda, Vashek Matyás, James A. Malcolm, Frank Stajano, Jonathan Anderson:
Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9379, Springer 2015, ISBN 978-3-319-26095-2 [contents] - 2014
- [c19]Jonathan Anderson, Robert N. M. Watson, David Chisnall, Khilan Gudka, Ilias Marinos, Brooks Davis:
TESLA: temporally enhanced system logic assertions. EuroSys 2014: 19:1-19:14 - [c18]Jonathan Woodruff, Robert N. M. Watson, David Chisnall, Simon W. Moore, Jonathan Anderson, Brooks Davis, Ben Laurie, Peter G. Neumann, Robert M. Norton, Michael Roe:
The CHERI capability model: Revisiting RISC in an age of risk. ISCA 2014: 457-468 - [e3]Bruce Christianson, James A. Malcolm, Vashek Matyás, Petr Svenda, Frank Stajano, Jonathan Anderson:
Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers. Lecture Notes in Computer Science 8809, Springer 2014, ISBN 978-3-319-12399-8 [contents] - 2013
- [b2]Jonathan Anderson:
Privacy engineering for social networks. University of Cambridge, UK, 2013 - [j3]Jonathan Anderson, Frank Stajano:
Must Social Networking Conflict with Privacy? IEEE Secur. Priv. 11(3): 51-60 (2013) - [c17]William R. Harris, Somesh Jha, Thomas W. Reps, Jonathan Anderson, Robert N. M. Watson:
Declarative, Temporal, and Practical Programming with Capabilities. IEEE Symposium on Security and Privacy 2013: 18-32 - [c16]Robert N. M. Watson, Steven J. Murdoch, Khilan Gudka, Jonathan Anderson, Peter G. Neumann, Ben Laurie:
Towards a Theory of Application Compartmentalisation. Security Protocols Workshop 2013: 19-27 - [e2]Bruce Christianson, James A. Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau:
Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8263, Springer 2013, ISBN 978-3-642-41716-0 [contents] - 2012
- [j2]Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway:
A taste of Capsicum: practical capabilities for UNIX. Commun. ACM 55(3): 97-104 (2012) - [c15]Jonathan Anderson, Robert N. M. Watson:
Stayin' Alive: Aliveness as an Alternative to Authentication. Security Protocols Workshop 2012: 242-250 - [c14]Jonathan Anderson:
Stayin' Alive: Aliveness as an Alternative to Authentication (Transcript of Discussion). Security Protocols Workshop 2012: 251-258 - [e1]Bruce Christianson, James A. Malcolm, Frank Stajano, Jonathan Anderson:
Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7622, Springer 2012, ISBN 978-3-642-35693-3 [contents] - 2011
- [c13]Jonathan Anderson, Frank Stajano, Robert N. M. Watson:
How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort). Security Protocols Workshop 2011: 359-367 - [c12]Jonathan Anderson:
How to Keep Bad Papers Out of Conferences (Transcript of Discussion). Security Protocols Workshop 2011: 368-380 - 2010
- [b1]Jonathan Anderson, John MacRee, Robb Wilson:
Effective UI - The Art of Building Great User Experience in Software. O'Reilly 2010, ISBN 978-0-596-15478-3, pp. I-XV, 1-294 - [j1]Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway:
Introducing Capsicum: Practical Capabilities for UNIX. login Usenix Mag. 35(6) (2010) - [c11]Jonathan Anderson, Frank Stajano:
On Storing Private Keys in the Cloud. Security Protocols Workshop 2010: 98-106 - [c10]Jonathan Anderson:
On Storing Private Keys in the Cloud (Transcript of Discussion). Security Protocols Workshop 2010: 107-114 - [c9]Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway:
Capsicum: Practical Capabilities for UNIX. USENIX Security Symposium 2010: 29-46 - [c8]Jonathan Anderson, Joseph Bonneau, Frank Stajano:
Inglorious Installers: Security in the Application Marketplace. WEIS 2010
2000 – 2009
- 2009
- [c7]Joseph Bonneau, Jonathan Anderson, George Danezis:
Prying Data out of a Social Network. ASONAM 2009: 249-254 - [c6]Jonathan Anderson, Claudia Díaz, Joseph Bonneau, Frank Stajano:
Privacy-enabling social networking over untrusted networks. WOSN 2009: 1-6 - [c5]Joseph Bonneau, Jonathan Anderson, Ross J. Anderson, Frank Stajano:
Eight friends are enough: social graph approximation via public listings. SNS 2009: 13-18 - [c4]Joseph Bonneau, Jonathan Anderson, Luke Church:
Privacy suites: shared privacy for social networks. SOUPS 2009 - [c3]Luke Church, Jonathan Anderson, Joseph Bonneau, Frank Stajano:
Privacy stories: confidence in privacy behaviors through end user programming. SOUPS 2009 - [c2]Jonathan Anderson, Frank Stajano:
Not That Kind of Friend. Security Protocols Workshop 2009: 343-349 - [c1]Jonathan Anderson:
Not That Kind of Friend. Security Protocols Workshop 2009: 350-364
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint