Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Steven B. Lipner is active.

Publication


Featured researches published by Steven B. Lipner.


Communications of The ACM | 1996

Commercial key recovery

Stephen T. Walker; Steven B. Lipner; Carl M. Ellison; David M. Balenson

eavesdropper and a serious disadvantage to the target of the eavesdropping. Sometimes the eavesdropper is the government— either law enforcement or an intelligence agency— and these agencies have learned to prize such sources of information very highly. They entail minimum risk for agents without inhibiting the conversations of the targets. Sometimes the eavesdropper is a criminal and the target is a solid citizen. In that case, security is needed. Cryptography provides the needed security and digital computers provide a means to implement high-quality cryptography with minimal inconve-


ieee symposium on security and privacy | 2000

Security and source code access: issues and realities

Steven B. Lipner

This paper addresses some of the benefits and drawbacks for security of open access to source code. After a discussion of alternative models for open access to source code, the paper reviews the positive and negative implications of each for system security. The paper concludes that source code review can have real benefits for security, but that those benefits are not realized automatically, and that some source code access models introduce significant drawbacks.


Communications of The ACM | 2015

Security assurance

Steven B. Lipner

How can customers tell they are getting it?


ieee symposium on security and privacy | 1999

Twenty years of evaluation criteria and commercial technology

Steven B. Lipner

The major source of progress in computer security products during the last twenty years (1980-99) has been the Internet revolution of the mid-nineties. Evaluation criteria and processes have provided users with some characterization of the security attributes of operating system products. The newly developed Common Criteria show promise of offering more timely and relevant evaluation results. However there is little sign of progress in products that can deal with hostile code or in meeting needs for high assurance.


ieee symposium on security and privacy | 2006

Information assurance technology forecast 2005

Virgil D. Gligor; Thomas Haigh; Dick Kemmerer; Carl E. Landwehr; Steven B. Lipner; John McLean

This paper gives insights into how the threats evolving nature, the current information technology environment, and various market forces are combining to yield new security challenges and likely new technology paths for the future.


Archive | 1995

Key Escrow Cryptosystems

Dorothy E. Denning; Ernest F. Brickell; Stephen T. Kent; David P. Maher; Walter Tuchman; Matt Blaze; Silvio Micali; Stephen T. Walker; David M. Balenson; Carl M. Ellison; Steven B. Lipner

Key escrow systems are those where part or all of the cryptographic keys are kept “in escrow” by third parties. The keys are released only upon proper authority to allow some person other than the original sender or receiver to read the message. The U. S. government is strongly supporting key escrow as a way to balance the needs for secrecy between communicating persons against the needs of law enforcement and national security agencies to sometimes read these encrypted communications (with proper legal authority). This chapter presents the technical aspects of the Clipper Chip, the U.S. Government’s first proposed key escrow system. It also mentions how Clipper fits into other proposed government cryptosystems and then presents a more general view of key escrow cryptosystems.


annual computer security applications conference | 2004

The trustworthy computing security development lifecycle

Steven B. Lipner


ieee symposium on security and privacy | 1982

Non-Discretionery Controls for Commercial Applications

Steven B. Lipner


Archive | 2007

Cross-site scripting filter

David Andrew Ross; Steven B. Lipner


Archive | 1995

Commercial Key Escrow: Something for Everyone Now and for the Future

Stephen T. Walker; Steven B. Lipner; Carl M. Ellison; Dennis K. Branstad; David M. Balenson

Collaboration


Dive into the Steven B. Lipner's collaboration.

Top Co-Authors

Avatar

Carl M. Ellison

Trusted Information Systems

View shared research outputs
Top Co-Authors

Avatar

Dick Kemmerer

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

John McLean

United States Naval Research Laboratory

View shared research outputs
Top Co-Authors

Avatar

Matt Blaze

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge