scispace - formally typeset
A

Aaron Blankstein

Researcher at Princeton University

Publications -  15
Citations -  514

Aaron Blankstein is an academic researcher from Princeton University. The author has contributed to research in topics: Web server & Encryption. The author has an hindex of 8, co-authored 15 publications receiving 450 citations.

Papers
More filters
Proceedings Article

CONIKS: bringing key transparency to end users

TL;DR: CONIKS builds on transparency log proposals for web server certificates but solves several new challenges specific to key verification for end users, and obviates the need for global third-party monitors and enables users to efficiently monitor their own key bindings for consistency.
Proceedings Article

Abstractions for usable information flow control in Aeolus

TL;DR: A new, simpler security model, the first to combine a standard principal-based scheme for authority management with thread-granularity information flow tracking, and a number of new mechanisms that support common design patterns in secure application design are provided.
Proceedings Article

Social networking with frientegrity: privacy and integrity with an untrusted provider

TL;DR: Frientegrity, a framework for social networking applications that can be realized with an untrusted service provider, is presented and an access control mechanism that offers efficient revocation and scales logarithmically with the number of friends is introduced.
Proceedings Article

Hyperbolic caching: flexible caching for web applications

TL;DR: This work designs a new caching algorithm for web applications called hyperbolic caching, which decays item priorities at variable rates and continuously reorders many items at once and introduces the notion of a cost class in order to measure the costs and manipulate the priorities of all items belonging to a related group.
Proceedings ArticleDOI

Automating Isolation and Least Privilege in Web Services

TL;DR: The design and implementation of Passe is described, a system that protects a data store from unintended data leaks and unauthorized writes even in the face of application compromise, and it mitigate the cross-component effects of cross-site scripting (XSS) attacks by combining browser HTML5 sandboxing techniques with its automatic component separation.