Ronald Aigner
Microsoft
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ronald Aigner.
trust and trustworthy computing | 2013
Jan C. Nordholz; Ronald Aigner; Paul England
Traditional network authentication systems like Windows’ Active Directory or MIT’s Kerberos only provide for mutual authentication of communicating entities, e.g. a user’s email client interacting with an IMAP server, while the user’s machine is inherently assumed to be trusted. While there have been first attempts to explicitly establish this trust relationship by leveraging the Trusted Platform Module, these provide no means to directly react to potentially relevant changes in the client’s system state. We expand previous designs by binding keys to the current platform state and involving these in the network authentication process, thereby guaranteeing the continued validity of the attestee.
usenix security symposium | 2016
Himanshu Raj; Stefan Saroiu; Alec Wolman; Ronald Aigner; Jeremiah Cox; Paul England; Chris Fenner; Kinshuman Kinshumann; Jork Löser; Dennis Mattoon; Magnus Nystrom; David Robinson; Rob Spiger; Stefan Thom; David R. Wooten
Archive | 2013
Ronald Aigner
Archive | 2015
Himanshu Raj; Stefan Saroiu; Alec Wolman; Ronald Aigner; Jeremiah Cox; Paul England; Chris Fenner; Kinshuman Kinshumann; Jork Loeser; Dennis Mattoon; Magnus Nystrom; David Robinson; Rob Spiger; Stefan Thom; David R. Wooten
Archive | 2014
Stefan Thom; Ronald Aigner; Dennis Mattoon; Stuart Schaefer; Merzin Kapadia; Robert Karl Spiger; David R. Wooten; Paul England
Archive | 2013
Stefan Thom; Ronald Aigner
Archive | 2016
Stefan Thom; Ronald Aigner
Archive | 2015
Ronald Aigner; Kevin Kane; Stefan Thom
Archive | 2010
Jonathan Ross; Ronald Aigner; Jan Simon Rellermeyer; Jork Loeser
Archive | 2014
Stefan Thom; Ronald Aigner