Selected Publications

  1. The Client Utility Demo isn't a publication, but it shows a vision of the Global Computer that we put together in May, 1998. Be patient, we don't have a streaming server, so the 45 minute video takes several minutes to get started. (You'll need a free copy of RealPlayer.)
  2. Speeding Up N-body Calculations on Machines Lacking a Hardware Square Root, Scientific Programming, 1, #2, pp. 133--141, Winter (1992)
  3. Data Merging for Shared Memory Multiprocessors, with V. Sarkar, Hawaii International Conference on System Science 26, Honolulu, Hawaii January (1993)
  4. Hardware Support for Data Merging, with R. Gupta, International Workshop on Support for Large Scale Shared Memory Multiprocessors at the International Parallel Processing Symposium, Cancun, Mexico, April, (1994)
  5. Some Experiences with Network Linda, International J. High Speed Computing, 6, #1, pp. 55--80, (1994)
  6. Bit Reversals on Uniprocessors, SIAM Review, vol. 38, #1, 1--26, March (1996)
  7. High Precision Division and Square Root, with P. Markstein, ACM Trans. Math. Software, vol. 23, #4, 561--589, December (1997)
  8. Recent Advances in the Spherical Harmonics Method, International Journal of Engineering Science, vol. 36, #12-14, pp. 1551--1579, September-November (1998)
  9. A Gaussian Quadrature Rule for an Integral from Radiation Transfer Calculations, with M. Gander, Journal of Quantitative Spectroscopy and Radiative Transfer, vol. 68, pp. 213--223, January (2001)
  10. Conversations + Interfaces = Business Logic, with H. Kuno, M. Lemon, and D. Berenger, Proc. Second Intl. Workshop, Technologies for E-Services, Rome, Italy, September 2001, published in Technologies for E-Services, vol. 2193 of Lecture Notes in Computer Science, Springer:Berlin (2001)
  11. Web Services Conversation Language (WSCL) 1.0, W3C Note 100, with many co-authors, May (2002)
  12. Using Split Capabilities for Access Control, with G. Rozas, A. Banerji, R. Gupta, IEEE Software, vol. 20, #1, pp 42-49, January (2003)
  13. E-speak E-xplained, CACM, vol. 46. #7, pp. 113-118, July (2003)
  14. The Global Computer, Proc. 4th Int. Conf. on Creating, Connecting and Collaborating through Computing (C5 2006), Berkeley, CA, IEEE Press, January (2006). The original tech report, "The Global Computer", was rejected by IEEE Computer (1991) and everyone else I submitted it to, but I still like it.
  15. Authorization Based Access Control for the Services Oriented Architecture, Proc. 4th Int. Conf. on Creating, Connecting and Collaborating through Computing (C5 2006), Berkeley, CA, IEEE Press, January (2006)
  16. Polaris: Virus Safe Computing for Windows XP, with M. Stiegler, K.-P. Yee, T. Close, and M. Miller, Communications of the ACM, vol. 49, #9, pp. 83-88, September (2006)
  17. Customizable Description and Dynamic Discovery for Web Services, with W. Kim, ACM Conference on Electronic Commerce (EC'04), New York, May (2004)
  18. Delegating Responsibility in Digital Systems: Horton's "Who Done It?", with M. Miller and J. Donnelley, HotSec '07, Boston, MA, August (2007)
  19. Access Control for the Services Oriented Architecture, with J. Li, ACM Workshop on Secure Web Services, ACM #459074, pp. 9-17, Fairfax, VA, November 2007
  20. Improving Usability by Adding Security to a Video Conferencing Collaboration System, with A. Mitchell, Usable Security 2007, Lecture Notes in Computer Science, #4886, pp. 378-382, 2008.
  21. Mobile In-Store Personalized Services, with J. Li, I. Ari, J. Jain, and M. Dekhil, International Conference on Web Services (ICWS 2009), July 7-10, Los Angeles
  22. Near-field communication-based secure mobile payment service, Proc. 11th Intl. Conf. on Electronic Commerce (ICEC'09), Taipei, pp. 142-151, August 2009
  23. Solving the Transitive Access Problem for the Services Oriented Architecture, Fifth International Conference on Availability, Reliability, and Security (ARES 1010), February 15-18, Krakow, Poland (Best Paper)
  24. Making Policy Decisions Disappear into the User's Workflow, ACM Conference on Human Factors in Computing Systems (CHI 2010), Work-In-Progress, April 10-15, Atlanta, GA
  25. From ABAC to ZBAC: The Evolution of Access Control Models, Journal of Information Warfare, vol. 9, #2, pp. 37-45,September 2010
  26. Managing Data Retention Policies at Scale, Information Management (IM 2011), Dublin, May 2011 (Best Paper)
  27. Clusterken: A Reliable Object-Based Messaging Framework to Support Data Center Processing, Open Cirrus Summit, Moscow, June 2011
  28. Access Control for IoT, IEEE Workshop on Security and Privacy for IoT, Washington, DC, December 2015