2012 - Fellow of the American Association for the Advancement of Science (AAAS)
2001 - ACM Fellow For foundational and highly influential contributions to cryptographic complexity theory, authorization and trust management, massive-data-stream computation, and algorithmic mechanism design.
Joan Feigenbaum mainly focuses on Trust management, Computer security, Theoretical computer science, Discrete mathematics and Combinatorics. Her Trust management research integrates issues from The Internet, Knowledge management and Public-key cryptography. Her study on Computer security is mostly dedicated to connecting different topics, such as Internet privacy.
The study incorporates disciplines such as Programming language, Computation, Distributed algorithmic mechanism design and Multicast in addition to Theoretical computer science. Her Discrete mathematics research includes elements of Function and Computational complexity theory. Her Security policy research is multidisciplinary, incorporating elements of Security information and event management and Cryptography.
Her primary areas of investigation include Computer security, Discrete mathematics, Theoretical computer science, Combinatorics and Computer network. Her work deals with themes such as The Internet and Internet privacy, which intersect with Computer security. She combines subjects such as Function, Set and Computational complexity theory with her study of Discrete mathematics.
Joan Feigenbaum has included themes like Space and Secure multi-party computation, Computation in her Theoretical computer science study. Her Combinatorics research is multidisciplinary, relying on both PSPACE and Probabilistic logic. Her studies examine the connections between Computer network and genetics, as well as such issues in Distributed computing, with regards to Distributed algorithmic mechanism design.
The scientist’s investigation covers issues in Computer security, Computer network, Encryption, Internet privacy and Anonymity. In her study, Network security is strongly linked to The Internet, which falls under the umbrella field of Computer security. Her Encryption study integrates concerns from other disciplines, such as Secure multi-party computation, Computation, Cryptography, Key and Communications protocol.
She has included themes like Database and Intellectual property in her Cryptography study. Her biological study spans a wide range of topics, including Control, Information sensitivity, World Wide Web and Revenue. Her work deals with themes such as Probabilistic analysis of algorithms and A priori and a posteriori, which intersect with Anonymity.
Joan Feigenbaum spends much of her time researching Computer security, Secure multi-party computation, Computer network, Computation and Adversary. As part of her studies on Computer security, she frequently links adjacent subjects like The Internet. Joan Feigenbaum interconnects Network element, Information assurance and Internet privacy in the investigation of issues within The Internet.
The study incorporates disciplines such as Field, Guard, Theoretical computer science and Boolean circuit in addition to Secure multi-party computation. Her study looks at the intersection of Computation and topics like Distributed computing with Secure two-party computation and Encryption. Joan Feigenbaum usually deals with Adversary and limits it to topics linked to Autonomous system and Network simulation, Path, Network security and Network architecture.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Decentralized trust management
Matt Blaze;Joan Feigenbaum;Jack Lacy.
ieee symposium on security and privacy (1996)
The role of trust management in distributed systems security
Matt Blaze;Joan Feigenbaum;John Ioannidis;Angelos D. Keromytis.
Secure Internet programming (2001)
The KeyNote Trust-Management System Version 2
M. Blaze;J. Feigenbaum;J. Ioannidis;A. Keromytis.
RFC (1999)
Sharing the Cost of Multicast Transmissions
Joan Feigenbaum;Christos H. Papadimitriou;Scott Shenker.
Journal of Computer and System Sciences (2001)
Delegation logic: A logic-based approach to distributed authorization
Ninghui Li;Benjamin N. Grosof;Joan Feigenbaum.
ACM Transactions on Information and System Security (2003)
Distributed algorithmic mechanism design: recent results and future directions
Joan Feigenbaum;Scott Shenker.
international workshop on discrete algorithms and methods for mobile computing and communications (2002)
Referee: trust management for Web applications
Yang-Hua Chu;Joan Feigenbaum;Brian LaMacchia;Paul Resnick.
World Wide Web (1997)
The KeyNote trust management system version2, IETF RFC 2704
Matt Blaze;Joan Feigenbaum;John Ioannidis;Angelos D. Keromytis.
(1999)
Information accountability
Daniel J. Weitzner;Harold Abelson;Tim Berners-Lee;Joan Feigenbaum.
Communications of The ACM (2008)
A BGP-based mechanism for lowest-cost routing
Joan Feigenbaum;Christos Papadimitriou;Rahul Sami;Scott Shenker.
Distributed Computing (2005)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of California, Berkeley
University of Pennsylvania
University of Michigan–Ann Arbor
Barnard College
École Polytechnique Fédérale de Lausanne
United States Naval Research Laboratory
University of Illinois at Urbana-Champaign
Hebrew University of Jerusalem
Illinois Institute of Technology
AT&T (United States)
Boston College
Bruegel
Facebook (United States)
Polytechnic University of Milan
The University of Texas at Austin
South China Normal University
Northeastern University
Norwegian University of Science and Technology
Finnish Meteorological Institute
Marine Biological Association of the United Kingdom
Kyoto University
National Institutes of Health
National University of Ireland, Galway
Imperial College London
Duke University
University of Sydney