Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Share This Author
The CHERI capability model: Revisiting RISC in an age of risk
- Jonathan Woodruff, R. Watson, M. Roe
- Computer ScienceACM/IEEE 41st International Symposium on Computer…
- 16 October 2014
TLDR
Prying Data out of a Social Network
- Joseph Bonneau, Jonathan Anderson, G. Danezis
- Computer ScienceInternational Conference on Advances in Social…
- 20 July 2009
TLDR
Capsicum: Practical Capabilities for UNIX
- R. Watson, Jonathan Anderson, B. Laurie, Kristian D. Kennaway
- Computer ScienceUSENIX Security Symposium
- 11 August 2010
TLDR
Eight friends are enough: social graph approximation via public listings
- Joseph Bonneau, Jonathan Anderson, Ross J. Anderson, F. Stajano
- Computer ScienceSNS '09
- 31 March 2009
TLDR
Privacy-enabling social networking over untrusted networks
- Jonathan Anderson, Claudia Díaz, Joseph Bonneau, F. Stajano
- Computer ScienceWOSN '09
- 17 August 2009
TLDR
Privacy suites: shared privacy for social networks
- Joseph Bonneau, Jonathan Anderson, Luke Church
- Computer ScienceSOUPS
- 15 July 2009
TLDR
Inglorious Installers: Security in the Application Marketplace
- Jonathan Anderson, Joseph Bonneau, F. Stajano
- Computer ScienceWEIS
- 2010
TLDR
Must Social Networking Conflict with Privacy?
- Jonathan Anderson, F. Stajano
- Computer Science, EconomicsIEEE Security & Privacy
- 1 May 2013
Online social networks have serious privacy drawbacks, some of which stem from the business model. Must this be? Is the current OSN business model the only viable one? Or can we construct…
A Comparison of Unix Sandboxing Techniques
- Jonathan Anderson
- Computer Science
- 2018
TLDR
A taste of Capsicum
- R. Watson, Jonathan Anderson, B. Laurie, Kristian D. Kennaway
- Computer ScienceCommun. ACM
- 1 March 2012
TLDR
...
...