http:^^www-cse.ucsd.edu^users^bsy^
来自「This data set contains WWW-pages collect」· EDU^USERS^BSY^ 代码 · 共 98 行
EDU^USERS^BSY^
98 行
Date: Thu, 21 Nov 1996 20:07:32 GMTServer: NCSA/1.4.2Content-type: text/htmlLast-modified: Mon, 21 Oct 1996 22:41:08 GMTContent-length: 4691<!-- -- DO NOT EDIT THIS FILE. -- -- This .html file was machine generated from a .ht file via M4. -- -- DO NOT EDIT THIS FILE. --><html><head><title>Home Sweet Home (bsy's home page)</title></head><body background="/picts/commonbg.jpg"><h1>Home Sweet Home (bsy's home page)</h1><hr><!WA0><a href="http://www-cse.ucsd.edu/users/bsy/bio.html">Bennet Yee</a>'s research focuses on issues incomputer security. There are many inter-related areas that impact thesecurity of systems: user-interfaces, software systems design, theoremproving, and cryptography all play important roles.<p>One particular area that Bennet has been working on is the <i>securecoprocessor model</i>, where physically secure(tamper-detecting/-proof) hardware is added to conventional computingsystems. We perform security-critical operations such as theexecution of cryptographic protocols and access control decisions onlywithin secure coprocessors, where both privacy of key material andintegrity of security databases are axiomatic -- thereby bootstrappingsecurity properties from the secure coprocessor to the entire systemas a whole. This work includes some (minimal) hardware design,operating system implementation (porting<!WA1><a href="http://www.cs.cmu.edu/afs/cs.cmu.edu/project/mach/public/www/mach.html">Mach</a>3.0 microkernel to the prototype hardware), and cryptographic protocoldesign. Much of this work was done jointly with<!WA2><a href="http://www.cs.cmu.edu/~tygar/">Doug Tygar</a> at<!WA3><a href="http://www.cs.cmu.edu/">Carnegie Mellon</a> and<!WA4><a href="http://www.ibm.com/">IBM</a>'s<!WA5><a href="http://www.research.ibm.com/xw-D953/ecs.html">EmbeddedCryptographic Systems group</a>.<p>More recently, Bennet has been examining the design of practicalcryptographic protocols for efficient and yet secure Internet-basedtransactions, secure-coprocessor-based applications, and electroniccommerce. He was one of the coauthors of the<!WA6><a href="http://pct.microsoft.com/pct/pct.htm">PCT</a> protocol from<!WA7><a href="http://www.microsoft.com">Microsoft</a>, and more recently he'sbeen working with <!WA8><a href="http://www.netscape.com">Netscape</a>,<!WA9><a href="http://www.microsoft.com">Microsoft</a>, and others within theframework of the<!WA10><a href="http://www.ietf.cnri.reston.va.us/home.html">InternetEngineering Task Force</a> to come up with a merged protocolsatisfactory to all parties.<p>Bennet maintains <!WA11><a href="http://www-cse.ucsd.edu/users/bsy/sec.html">a list of Web resources relating tocomputer security</a>, ranging from cryptography resources, systemsecurity testing tools, to word compilations useful in eliminatingeasy-to-guess passwords. In addition to looking at the World Wide Webfrom the security and internet commerce point of view, Bennet alsoindulges plain old <!WA12><a href="http://www-cse.ucsd.edu/users/bsy/fun.html">fun hacks and Web-based linkcollecting</a>. (See also <!WA13><a href="http://www-cse.ucsd.edu/users/bsy/links.html">his web links page</a>).<p>His web pages here are still being worked on. You may be interestedin <!WA14><a href="http://www.cs.cmu.edu/afs/cs.cmu.edu/user/bsy/www/hsh.html">bsy's web pages at CMU</a>.<p><!WA15><a href="http://www-cse.ucsd.edu/users/bsy/papers.html">Some of Bennet's papers are online</a>. His<!WA16><a href="http://www-cse.ucsd.edu/users/bsy/bsy.key.asc">PGP public key is available</a>.<p>Bennet is teaching<!WA17><a href="http://www-cse.ucsd.edu/classes/fa96/cse30/">CSE 30</a> and<!WA18><a href="http://www-cse.ucsd.edu/users/bsy/cse291/index.html">CSE 291</a> this quarter.<p>Bennet taught CSE 80 in spring 1996; the archived web pages from thecourse is <!WA19><a href="http://www-cse.ucsd.edu/users/bsy/cse80/">still available</a>.<hr><font size=2>[ <!WA20><a href="http://www.cse.ucsd.edu">CSE home</a> |<!WA21><a href="file://cs.ucsd.edu/pub/showcal/cscalendar">CSE talks calendar</a> |<!WA22><a href="http://www-cse.ucsd.edu/users/bsy/">bsy's home page</a> |<!WA23><a href="http://work.ucsd.edu:5141/cgi-bin/http_webster">webster i/f</a> |<!WA24><a href="http://work.ucsd.edu:5141/cgi-bin/thesaurus">thesaurus i/f</a> |<!WA25><a href="http://www.yahoo.com">yahoo</a> |<!WA26><a href="http://www.lycos.com">lycos</a> |<!WA27><a href="http://www.altavista.digital.com">altavista</a>] </font><hr><!WA28><a href="http://www-cse.ucsd.edu/users/bsy/"><!WA29><img align="middle" src="http://www-cse.ucsd.edu/users/bsy/bsy.gif" alt="picture of bsy"></a><p> <!WA30><a href="http://www-cse.ucsd.edu/users/bsy/">bsy</a>@<!WA31><a href="http://www.cse.ucsd.edu">cse</a>.<!WA32><a href="http://www.ucsd.edu">ucsd</a>.edu, last updated <timestamp>Mon Oct 21 15:41:08 PDT 1996</timestamp>.<br><address><!WA33><a href="mailto:bsy@cs.ucsd.edu">email bsy</a></address><br><p><hr><center><!WA34><a href="http://www.eff.org/goldkey.html"><!WA35><img border=0 src="http://www-cse.ucsd.edu/users/bsy/gkey_bar_wh.gif" alt="Gold Key"></a><!WA36><a href="http://www.eff.org/blueribbon.html"><!WA37><img border=0 src="http://www-cse.ucsd.edu/users/bsy/rib_bar_wh.gif" alt="Blue Ribbon"></a><br>Join the <!WA38><a href="http://www.eff.org/goldkey.html">On-Line Privacy Campaign,</a><br>and the <!WA39><a href="http://www.eff.org/blueribbon.html">Anti-Censorship Campaign!</a></center><br></body></html>
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?