31. Two-Person Control Administration: Preventing Administration Faults through Duplication Potter, Shaya; Bellovin, Steven Michael; Nieh, Jason 2009 Articles Computer science
32. A Better Approach than Carrier-Grade-NAT Maennel, Olaf; Bush, Randy; Cittadini, Luca; Bellovin, Steven Michael 2008 Reports Computer science
33. An Algebra for Integration and Analysis of Ponder2 Policies Zhao, Hang; Lobo, Jorge; Bellovin, Steven Michael 2008 Articles Computer science
34. Newspeak: A Secure Approach for Designing Web Applications Dent, Kyle; Bellovin, Steven Michael 2008 Reports Computer science
35. PAR: Payment for Anonymous Routing Androulaki, Elli; Raykova, Mariana Petrova; Srivatsan, Shreyas; Stavrou, Angelos; Bellovin, Steven Michael 2008 Articles Computer science
36. Reputation Systems for Anonymous Networks Androulaki, Elli; Choi, Seung Geol; Bellovin, Steven Michael; Malkin, Tal G. 2008 Articles Computer science
37. Risking Communications Security: Potential Hazards of the Protect America Act Bellovin, Steven Michael; Blaze, Matt; Diffie, Whitfield; Landau, Susan; Neumann, Peter G.; Rexford, Jennifer 2008 Articles Computer science
38. ROFL: Routing as the Firewall Layer Zhao, Hang; Chau, Chi-Kin; Bellovin, Steven Michael 2008 Reports Computer science
39. RUST: A Retargetable Usability Testbed for Website Authentication Technologies Johnson, Maritza Lupe; Atreya, Chaitanya; Aviv, Adam; Raykova, Mariana Petrova; Bellovin, Steven Michael; Kaiser, Gail E. 2008 Articles Computer science
40. Security Assurance for Web Device APIs Johnson, Maritza Lupe; Bellovin, Steven Michael 2008 Articles Computer science