Stanford CIS

Blog

Showing - of 5024

Blog

(Untitled)

The Center for Internet and Society and the Stanford Law and Technology Association present Representative Rick Boucher discussing DC Perspectives on MGM v.…

Blog

Pearson Policy

Siani Pearson, Trusted Computing: Strenghts, Weaknesses and Further Opportunities for Enhancing Privacy, in: Herrmann et al. (eds.), iTrust 2005, Proceedings, S…

Blog

Robertson blames Hurricane on Lesbians

Ten bucks says this is on The Daily Show tonight. UPDATE: 9/14 3:04PM PST Of course, this turns out to be a hoax.  Still pretty fun how believable it is given…

Blog

Property-based Sealing

Although much of the policy discussion has focused on the problems created by TCG's remote attestation feature, people like Ross Anderson and, to some exten…

Blog

Ahmad Property-based sealing

Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi & Christian Stüble: Secure Data Management in Trusted Computing. In: Proceedings of the Worksho…

Blog

Columbine diaries-- public record?

Does private property seized under a search warrant become public record? The Colorado Supreme Court is currently considering this question in a case where the…

Blog

canada gig

September 13, 2005- Speaking on how new tools are competing with or completing traditional media at "News vs. Noise - Issue and Stakeholder Management in t…

Blog

Shi BIND

Elaine Shi, Adrian Perrig & Leendert Van Doorn, BIND: A Fine-grained Attestation Service for Secure Distributed Systems, in: Proceedings of the 2005 IEEE Sy…

Blog

Kevin Sites teams with Yahoo to cover war

With just a video camera and web access, Kevin Sites will be covering war zones for Yahoo at hotzone.yahoo.com.  According to the NYT: Mr. Sites intends to vis…

Blog

Schoen 2005

Seth Schoen, Compatibility, competition, and control in trusted computing environments, Information Security Technical Report (2005) 10, 105-119…

Blog

Sadeghi Perseus

Ahmad-Reza Sadeghi & Christian Stüble, Towards multilaterally secure computing platforms - with open source and trusted computing, Information Security Tech…