Steven B. Lipner
Microsoft
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Steven B. Lipner.
Communications of The ACM | 1996
Stephen T. Walker; Steven B. Lipner; Carl M. Ellison; David M. Balenson
eavesdropper and a serious disadvantage to the target of the eavesdropping. Sometimes the eavesdropper is the government— either law enforcement or an intelligence agency— and these agencies have learned to prize such sources of information very highly. They entail minimum risk for agents without inhibiting the conversations of the targets. Sometimes the eavesdropper is a criminal and the target is a solid citizen. In that case, security is needed. Cryptography provides the needed security and digital computers provide a means to implement high-quality cryptography with minimal inconve-
ieee symposium on security and privacy | 2000
Steven B. Lipner
This paper addresses some of the benefits and drawbacks for security of open access to source code. After a discussion of alternative models for open access to source code, the paper reviews the positive and negative implications of each for system security. The paper concludes that source code review can have real benefits for security, but that those benefits are not realized automatically, and that some source code access models introduce significant drawbacks.
Communications of The ACM | 2015
Steven B. Lipner
How can customers tell they are getting it?
ieee symposium on security and privacy | 1999
Steven B. Lipner
The major source of progress in computer security products during the last twenty years (1980-99) has been the Internet revolution of the mid-nineties. Evaluation criteria and processes have provided users with some characterization of the security attributes of operating system products. The newly developed Common Criteria show promise of offering more timely and relevant evaluation results. However there is little sign of progress in products that can deal with hostile code or in meeting needs for high assurance.
ieee symposium on security and privacy | 2006
Virgil D. Gligor; Thomas Haigh; Dick Kemmerer; Carl E. Landwehr; Steven B. Lipner; John McLean
This paper gives insights into how the threats evolving nature, the current information technology environment, and various market forces are combining to yield new security challenges and likely new technology paths for the future.
Archive | 1995
Dorothy E. Denning; Ernest F. Brickell; Stephen T. Kent; David P. Maher; Walter Tuchman; Matt Blaze; Silvio Micali; Stephen T. Walker; David M. Balenson; Carl M. Ellison; Steven B. Lipner
Key escrow systems are those where part or all of the cryptographic keys are kept “in escrow” by third parties. The keys are released only upon proper authority to allow some person other than the original sender or receiver to read the message. The U. S. government is strongly supporting key escrow as a way to balance the needs for secrecy between communicating persons against the needs of law enforcement and national security agencies to sometimes read these encrypted communications (with proper legal authority). This chapter presents the technical aspects of the Clipper Chip, the U.S. Government’s first proposed key escrow system. It also mentions how Clipper fits into other proposed government cryptosystems and then presents a more general view of key escrow cryptosystems.
annual computer security applications conference | 2004
Steven B. Lipner
ieee symposium on security and privacy | 1982
Steven B. Lipner
Archive | 2007
David Andrew Ross; Steven B. Lipner
Archive | 1995
Stephen T. Walker; Steven B. Lipner; Carl M. Ellison; Dennis K. Branstad; David M. Balenson