Travelled to:
1 × France
2 × Canada
3 × USA
Collaborated with:
∅ C.Dubnicki K.Li S.Gaw P.Fernandez-Kelly L.I.Millett B.Friedman A.J.Feldman W.P.Zeller M.J.Freedman D.S.Wallach D.Balfanz D.Dean M.A.Blumrich L.Iftode
Talks about:
use (2) architectur (1) paranoia (1) interfac (1) criteria (1) collabor (1) virtual (1) untrust (1) secreci (1) resourc (1)
Person: Edward W. Felten
DBLP: Felten:Edward_W=
Contributed to:
Wrote 7 papers:
- OSDI-2010-FeldmanZFF #collaboration #named #using
- SPORC: Group Collaboration using Untrusted Cloud Resources (AJF, WPZ, MJF, EWF), pp. 337–350.
- CAV-2008-Felten
- Coping with Outside-the-Box Attacks (EWF), pp. 3–4.
- CHI-2006-GawFF #email
- Secrecy, flagging, and paranoia: adoption criteria in encrypted email (SG, EWF, PFK), pp. 591–600.
- CHI-2001-MillettFF #design #online #towards #web
- Cookies and web browser design: toward realizing informed consent online (LIM, BF, EWF), pp. 46–52.
- SOSP-1997-WallachBDF #architecture #java #security
- Extensible Security Architecture for Java (DSW, DB, DD, EWF), pp. 116–128.
- HPCA-1996-BlumrichDFL #interface #network
- Protected, User-Level DMA for the SHRIMP Network Interface (MAB, CD, EWF, KL), pp. 154–165.
- HPCA-1996-IftodeDFL #automation #memory management #using
- Improving Release-Consistent Shared Virtual Memory Using Automatic Update (LI, CD, EWF, KL), pp. 14–25.