Tom Berson

  • Citations Per Year
Learn More
Cryptography is a powerful tool for building secure distributed systems, albeit at substantial computational cost. This is especially true for public key cryptography. Conventional wisdom dictates that cryptography must be done locally in order to be secure. We argue for an approach in which public key cryptographic operations are provided as a network(More)
The goal of the Department of Defense Kernelized Secure Operating System (KSOS) project is to design, implement and prove a secure operating system. Specifically, it is desired that KSOS be designed and proven to enforce a security model, derived from the security practices of the Department of Defense, referred to as "multilevel security." The proof(More)
Cryptography is a powerful tool for building secure distributed systems, albeit at substantial computational cost. This is especially true for public key cryptography. Conventional wisdom dictates that cryptography must be done locally in order to be secure. We argue for an approach in which public key cryptographic operations are provided as a network(More)
in fields as diverse as machine learning, cryptography, natural language processing, systems, security, and human computer-interaction, have been published about spam and e-mail. The Conference on E-mail and Anti-Spam was the first to bring together researchers from these varied fields to a single academic conference where they could exchange ideas and(More)
  • 1