Accountability in Computing: Concepts and Mechanisms,
Foundations
and Trends in Privacy and Security
2(4), 2020, pp. 247 - 399.
(by Joan Feigenbaum,
Aaron D. Jaggard,
and Rebecca N. Wright)
"PRShare:
A Framework for Privacy-Preserving, Interorganizational Data Sharing,"
to appear in ACM Transactions on Privacy and Security.
An earlier version appeared in the Proceedings of the 2020 ACM
Workshop on Privacy in the Electronic Society and can be found
here.
(by
Lihi Idan and
Joan Feigenbaum)
"Encryption
and Surveillance: Why the law-enforcement access question will not just go
away,"
Communications of the ACM 62:5 (May 2019), pp. 27 - 29.
(by
Joan Feigenbaum)
"On
the incommensurability of laws and technical mechanisms:
Or, what cryptography can't do," in
Proceedings of the 26th International Workshop on Security Protocols,
Lecture Notes in Computer Science, volume 11286, Springer, 2018,
pp. 266 - 279.
(by
Joan Feigenbaum and
Daniel J.
Weitzner)
"Multiple
Objectives of Lawful-Surveillance Protocols," in Proceedings of the
25th International Workshop on Security Protocols,
Lecture Notes in Computer Science, volume 10476, Springer, 2017, pp. 1 - 8.
(by
Joan Feigenbaum and
Bryan Ford)
"Avoiding The Man on the Wire:
Improving Tor's Security with Trust-Aware Path Selection,"
in Proceedings of the 24th Network and Distributed System Security
Symposium, 2017.
(by Aaron Johnson,
Rob Jansen,
Aaron D. Jaggard,
Joan Feigenbaum, and
Paul Syverson.)
"PriFi:
Low-Latency Anonymity for Organizational Networks," Proceedings on
Privacy-Enhancing Technologies 2020(4) : 24 - 47.
An earlier version appeared in the Proceedings of the 2016 ACM
Workshop on Privacy in the Electronic Society and can be found
here.
(by Ludovic Barman, Mahdi Zamani, Italo Dacosta,
Joan Feigenbaum,
Bryan Ford,
Jean-Pierre Hubaux, and David Wolinsky.)
"Privacy-Preserving
Lawful Contact Chaining (Preliminary Report),"
in Proceedings of the 15th
ACM Workshop on Privacy in the Electronic Society,
2016, pp. 185 - 188.
(by Aaron Segal,
Joan Feigenbaum,
and Bryan Ford.)
"Open, privacy-preserving protocols
for lawful surveillance," http://arxiv.org/abs/1607.03659.
Also available as YALEU/DCS/TR1526.
(by Aaron Segal,
Joan Feigenbaum,
and Bryan Ford.)
"Using Intel Software Guard Extensions for
Efficient Two-Party Secure Function Evaluation," in
Proceedings of the 2016 FC Workshop on Encrypted Computing
and Applied Homomorphic Cryptography,
Springer Verlag LNCS, vol. 9604, 2016, pp. 302 - 318.
(by Debayan Gupta,
Benjamin Mood,
Joan Feigenbaum,
Kevin Butler, and Patrick Traynor)
"On the use of security and privacy
technology as a plot device," in
Proceedings of the 23rd International Workshop on Security Protocols,
Springer Verlag LNCS, vol. 9379, 2015, pp. 261 - 275.
(by Joan Feigenbaum and
Brad Rosen)
"20,000 in League Under the Sea: Anonymous
Communication, Trust, MLATs, and Undersea Cables,"
Proceedings on Privacy Enhancing
Technologies, Volume 1, Issue 1, pp. 4-24 (April 2015).
(by Aaron D. Jaggard,
Aaron Johnson,
Sarah Cortes,
Paul Syverson, and
Joan Feigenbaum)
"Seeking Anonymity
in an Internet Panopticon,"
Communications of the ACM 58:10 (Oct 2015), pp. 58-69.
(by Joan Feigenbaum and
Bryan Ford)
"Reuse It or Lose It:
More Efficient Secure Computation Through Reuse of Encrypted Values," in
Proceedings of the 2014
ACM Conference on Computer and Communication Security, pp. 582 - 596.
(by Benjamin Mood,
Debayan Gupta,
Kevin Butler,
and Joan Feigenbaum)
"Open
vs. Closed Systems for Accountability," in
HotSoS '14:
Proceedings of the 2014
ACM Symposium and Bootcamp on the Science of Security,
Article No. 4.
(by Joan Feigenbaum,
Aaron D. Jaggard, and
Rebecca N. Wright)
"Approximate
Privacy: Foundations and Quantification,"
ACM Transaction on Algorithms,
Volume 10, Issue 3, Article 11 (June 2014).
Extended abtract in Proc. of ACM EC'10. See also DIMACS TRs
2009-14 and
2010-01.
(by Joan Feigenbaum,
Aaron D. Jaggard, and
Michael Schapira)
"Catching Bandits
and Only Bandits: Privacy-Preserving Intersection Warrants
for Lawful Surveillance," in
Proceedings
of the 4th USENIX Workshop on Free and Open Communications on the Internet, 2014.
(by
Aaron Segal,
Bryan Ford,
and Joan Feigenbaum)
"Systematizing Secure Computation for
Research and Decision Support," in
Proceedings of the 9th Conference
on Security and Cryptography for Networks,
Springer Verlag LNCS, vol. 8642, 2014, pp. 380 - 397.
(by
Jason Perry,
Debayan Gupta,
Joan Feigenbaum,
and Rebecca N. Wright)
"Representing Network Trust and Using It
to Improve Anonymous Communication," in
7th Workshop
on Hot Topics in Privacy Enhancing Technologies, 2014.
(by
Aaron D. Jaggard,
Aaron Johnson,
Paul Syverson,
and Joan Feigenbaum)
"On the Feasibility of a Technological
Response to the Surveillance Morass," in
Proceedings of the 22nd International Workshop on Security Protocols,
Springer Verlag LNCS, vol. 8809, 2014, pp. 239 - 252.
(by
Joan Feigenbaum and
Jérémie Koenig)
"Is Data Hoarding Necessary for Lawful Surveillance?,"
The Huffington Post, April 19, 2014.
(by
Joan Feigenbaum and
Bryan Ford)
"Practical and
Privacy-Preserving Policy Compliance for Outsourced Data," in
Proceedings of
the 2nd Workshop on Applied Homomorphic Cryptography, FC 2014 Workshops,
Springer Verlag LNCS, vol. 8438, 2014, pp. 181-194.
(by Giovanni Di Crescenzo,
Joan Feigenbaum,
Debayan Gupta, Euthimios Panagos, Jason Perry,
and Rebecca N. Wright)
"Structural Cloud Audits that Protect Private Information," in
Proceedings of the 2013 ACM Cloud Computing Security Workshop,
pp. 101-112.
(by Hongda Xiao, Bryan Ford, and
Joan Feigenbaum)
"Probabilistic Analysis of
Onion Routing in a Black-Box Model," in
ACM Transactions on Information and System Security,
Volume 15, Issue 3, Article 14 (November 2012).
An earlier version appeared in the
Proceedings of the 2007 Financial Crypto Conference
and can be found here.
(by Joan Feigenbaum,
Aaron Johnson,
and Paul Syverson)
"A
New Approach to Interdomain Routing Based on Secure Multi-Party Computation," in Proceedings of the 2012 ACM Workshop on Hot Topics in Networks.
(by Debayan Gupta, Aaron Segal, Aurojit Panda, Gil Segev, Michael Schapira,
Joan Feigenbaum, Jennifer Rexford, and Scott Shenker)
"An
Economic Analysis of User-Privacy Options in Ad-Supported Service,"
in Proceedings of the 2012 Workshop on Internet and Network Economics,
Springer
Verlag LNCS, vol. 7695, 2012, pp. 30-43.
(by Joan Feigenbaum,
Michael
Mitzenmacher, and
Georgios Zervas)
"Systematizing
'Accountability' in Computer Science (Version of Feb. 17, 2012),"
YALEU/DCS/TR-1452, Yale University, New Haven CT, February 2012.
(by Joan Feigenbaum,
Aaron D. Jaggard,
Rebecca N. Wright, and
Hongda Xiao)
"Defining
Anonymity in Networked Communication, version 1,"
YALEU/DCS/TR-1448, Yale University, New Haven CT, December 2011.
(by Joan Feigenbaum)
"Towards
a Formal Model of Accountability," in
Proceedings of the 14th New Security Paradigms Workshop,
ACM Press, New York, 2011, pp. 45-56.
(by Joan Feigenbaum,
Aaron D. Jaggard, and
Rebecca N. Wright)
"Accountability and
Deterrence in Online Life (Extended Abstract)," in
Proceedings of the
3rd International Conference on Web Science,
ACM Press, New York, 2011.
(by Joan Feigenbaum,
James Hendler,
Aaron D. Jaggard,
Daniel J. Weitzner, and
Rebecca N. Wright)
"Accountability
as a Driver of Innovative Privacy Solutions," in
Privacy and Innovation Symposium,
Yale
Law School Information Society Project, October 2010.
(by Joan Feigenbaum)
"Preventing Active Timing Attacks in Low-Latency Anonymous Communication (Extended Abstract),"
in Proceedings of the 10th Privacy-Enhancing Technologies Symposium,
Springer
Verlag LNCS, vol. 6205, 2010, pp. 166-183. See also
UT Austin CS Department TR 1965.
(by Joan Feigenbaum,
Aaron Johnson, and
Paul Syverson)
"Usability
of Browser-Based Tools for Web-Search Privacy," YALEU/DCS/TR-1424,
Yale University, New Haven CT, March 2010.
(by Felipe Saint-Jean and
Joan Feigenbaum)
"Information
Accountability," Communications of the
ACM 51:6 (June 2008), pp. 82-88.
(by
Daniel J. Weitzner,
Hal
Abelson,
Tim Berners-Lee,
Joan Feigenbaum,
James Hendler, and
Gerald Jay Sussman)
"Private Web
Search," in
Proceedings of the 6th Workshop on Privacy in the Electronic Society,
ACM Press, New York, 2007, pp. 84-90.
(by Felipe Saint-Jean,
Aaron Johnson,
Dan Boneh,
and Joan Feigenbaum)
"Probabilistic
Analysis of Onion Routing in a Black-box Model," in
Proceedings of the 6th Workshop on Privacy in the Electronic Society,
ACM Press, New York, 2007, pp. 1-10.
(by Joan Feigenbaum,
Aaron Johnson,
and Paul Syverson)
"Towards a
Theory of Data Entanglement,"
Theoretical
Computer Science 389 (2007), pp. 26-43.
Extended abstract in Proc. of ESORICS'04.
(by James Aspnes,
Joan Feigenbaum,
Aleksandr Yampolskiy, and
Sheng Zhong)
"Information
Accountability," MIT-CSAIL-TR-2007-034, June 2007.
(by
Daniel J. Weitzner,
Hal
Abelson,
Tim Berners-Lee,
Joan Feigenbaum,
James Hendler, and
Gerald Jay Sussman)
"Report
on the 2006 PORTIA/TAMI Workshop on Privacy and Accountability," June 2006.
(Edited by Joan Feigenbaum and
Daniel J. Weitzner)