Using a rules model to improve handling of personally identifiable information SB Adler, EF Bangerter, NHJ Brown, J Camenisch, AM Gilbert, G Karjoth, ... US Patent 7,069,427, 2006 | 410 | 2006 |
Vehicle customization, restriction, and data logging KA Goldman, CC Palmer, ER Palmer US Patent 6,430,488, 2002 | 303 | 2002 |
An approach to a problem in network design using genetic algorithms CC Palmer, A Kershenbaum Networks 26 (3), 151-163, 1995 | 253 | 1995 |
Authenticated electronic coupon issuing and redemption CC Palmer, ER Palmer, SW Smith US Patent 6,505,773, 2003 | 249 | 2003 |
Representing trees in genetic algorithms CC Palmer, A Kershenbaum Proceedings of the First IEEE conference on evolutionary computation. IEEE …, 1994 | 236 | 1994 |
Security in an autonomic computing environment DM Chess, CC Palmer, SR White IBM Systems journal 42 (1), 107-118, 2003 | 172 | 2003 |
Ethical hacking CC Palmer IBM Systems Journal 40 (3), 769-780, 2001 | 142 | 2001 |
Using a privacy agreement framework to improve handling of personally identifiable information SB Adler, NHJ Brown, AM Gilbert, CC Palmer, M Schnyder, M Waidner US Patent 7,603,317, 2009 | 137 | 2009 |
Collaborative server processing of content and meta-information with application to virus checking in a server network BT Hailpern, PK Malkin, RJ Schloss, SR White, PS Yu, CC Palmer US Patent 6,275,937, 2001 | 131 | 2001 |
Using an object model to improve handling of personally identifiable information SB Adler, EF Bangerter, KA Bohrer, NHJ Brown, J Camenisch, AM Gilbert, ... US Patent 7,962,962, 2011 | 97 | 2011 |
Technical challenges of network anonymity D Kesdogan, C Palmer Computer Communications 29 (3), 306-324, 2006 | 31 | 2006 |
Netbios name authentication JK Kravitz, CC Palmer US Patent 4,930,159, 1990 | 27 | 1990 |
Two algorithms for finding optimal communications spanning trees CC Palmer, A Kershenbaum IBM Thomas J. Watson Research Division, 1994 | 15 | 1994 |
Protecting You [Guest editors' introduction] MA Sasse, CC Palmer IEEE Security & Privacy 12 (1), 11-13, 2014 | 10 | 2014 |
Call in the cyber national guard! CE Irvine, CC Palmer IEEE Security & Privacy 8 (1), 56-59, 2010 | 9 | 2010 |
Helping you protect you MA Sasse, CC Palmer, M Jakobsson, S Consolvo, R Wash, LJ Camp IEEE Security & Privacy 12 (1), 39-42, 2014 | 7 | 2014 |
Guest Editors' Introduction: Managing Organizational Security SL Pfleeger, RL Trope, CC Palmer IEEE Security & Privacy 5 (3), 13-15, 2007 | 4 | 2007 |
Can we win the security game? CC Palmer IEEE Security & Privacy 2 (01), 10-12, 2004 | 2 | 2004 |
The past present and future of network anonymity D Kesdogan, C Palmer Network Security, Special Issue of Computer Communications Journal, Elsevier, 2003 | 2 | 2003 |
The GILDA LAN Design Tool CC Palmer, M Naghshineh, JSC Chen Proceedings of the International Workshop on Modeling, Analysis, and …, 1993 | 2 | 1993 |