Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Bennet Yee is active.

Publication


Featured researches published by Bennet Yee.


Secure Internet programming | 2001

A sanctuary for mobile agents

Bennet Yee

The Sanctuary project at UCSD is building a secure infrastructure for mobile agents, and examining the fundamental security limits of such an infrastructure.


the cryptographers track at the rsa conference | 2003

Forward-security in private-key cryptography

Mihir Bellare; Bennet Yee

This paper provides a comprehensive treatment of forwardsecurity in the context of shared-key based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure. We provide definitions of security, practical proven-secure constructions, and applications for the main primitives in this area. We identify forwardsecure pseudorandom bit generators as the central primitive, providing several constructions and then showing how forward-secure message authentication schemes and symmetric encryption schemes can be built based on standard schemes for these problems coupled with forwardsecure pseudorandom bit generators. We then apply forward-secure message authentication schemes to the problem of maintaining secure access logs in the presence of break-ins.


ASIAN '96 Proceedings of the Second Asian Computing Science Conference on Concurrency and Parallelism, Programming, Networking, and Security | 1996

Cryptographic Postage Indicia

J. D. Tygar; Bennet Yee; Nevin Heintze

Metered mail provides substantial opportunities for fraud. (Indeed, losses due to meter fraud in the United States are said to exceed


Lecture Notes in Computer Science | 1998

Mobile Agents and Intellectual Property Protection

Stephane G. Belmon; Bennet Yee

100 million annually.) We apply cryptographic techniques to prevent several types of improper use of metering indicia.


Personal and Ubiquitous Computing | 1998

Mobile agents and intellectual property protection

Stephane G. Belmon; Bennet Yee

Technical enforcement of intellectual property (IP) rights often conflicts with the ability to use the IP. This is especially true when the IP is data, which may easily be copied while it is being accessed. As electronic commerce of data becomes more widespread, traditional approaches will prove increasingly problematic. In this paper, we show that the mobile agent architecture is an ideal solution to this dilemma: by providing full access to the data but charging for the transmission of results back to the user — results-based billing — we resolve the access versus protection conflict. We define new requirements for agent frameworks to implement results-based billing: “data-aware accounting” and “data-tight sandboxing”, which, along with the common requirements such as authentication, authorization, agent self-monitoring, and efficiency, provide the mechanisms by which database owners can effectively grant users access to their intellectual property.


Archive | 1994

Using Secure Coprocessors

Bennet Yee

Technical enforcemment of intellectual property (IP) rights often conflicts with the ability to use the IP. This is especially true when the IP is data, which may eaisly be copied while it is being accessed. As electronic commerce of data becomes more widespread, traditional approaches will prove increasingly problematic. In this paper, we show that the mobile agent architecture is an ideal solution to this dilemma: by providing full access to the data but charging for the transmission of results back to the user-reslts-based billing-we resulve the access versus protection conflict. We define new requirements for agent frameworks to implement results-based billing: “data-aware accounting” and “data-tight sandboxing”, which, along with the common requirements such as authentication, authorisation, agen self-monitoring, and efficiency, provide the mechanisms by which database owners can effectively grant users access to their intellectual property.


Archive | 1991

Dyad : a system for using physically secure coprocessors

J. D. Tygar; Bennet Yee


WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1 | 1995

Secure coprocessors in electronic commerce applications

Bennet Yee; J. D. Tygar


Archive | 1996

System and method for self-identifying a portable information device to a computing unit

Bennet Yee; Josh Benaloh


Archive | 1996

Non-biased pseudo random number generator

Matthew W. Thomlinson; Daniel R. Simon; Bennet Yee

Collaboration


Dive into the Bennet Yee's collaboration.

Top Co-Authors

Avatar

J. D. Tygar

University of California

View shared research outputs
Top Co-Authors

Avatar

Mihir Bellare

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Howard Gobioff

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Jean Camp

Sandia National Laboratories

View shared research outputs
Researchain Logo
Decentralizing Knowledge