Kenneth A Goldman  Kenneth A Goldman photo         

contact information

Secure Systems Department
Thomas J. Watson Research Center, Yorktown Heights, NY USA



TPM 2.0 Software TPM
Kenneth Goldman

Kenneth Goldman

Scalable attestation: a step toward secure and trusted clouds
Stefan Berger, Kenneth Goldman, Dimitrios Pendarakis, David Safford, Enriquillo Valdez, Mimi Zohar
Cloud Engineering (IC2E), 2015 IEEE International Conference on, pp. 185--194

A Practical Guide to TPM 2.0 Using the Trusted Platform Module in the New Age of Security
Ken Goldman, Will Arthur, David Challener
Apress, 2015


Optimizing ORAM and Using It Efficiently for Secure Computation
Craig Gentry, Kenny A. Goldman, Shai Halevi, Charanjit S. Jutla, Mariana Raykova, Daniel Wichs
Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings, pp. 1--18


SHA-1 Uses in TPM v1.2
Ken Goldman (IBM Research), Stan Potter (United States Department of Defense)
White Paper, Trusted Computing Group, 2011


IBM software trusted platform module
K Goldman
Source code: http://ibmswtpm. sourceforge. net/( ..., 2010

Scalable integrity monitoring in virtualized environments
Kenneth Goldman, Reiner Sailer, Dimitrios Pendarakis, Deepa Srinivasan
Proceedings of the fifth ACM workshop on Scalable trusted computing, pp. 73--78, 2010


Radio frequency identification system with write broadcast capability
Heinrich; Harley Kent, Cesar; Christian Lenz, Cofino; Thomas A., Friedman; Daniel J., Goldman; Kenneth Alan, Greene; Sharon Louise, McAuliffe; Kevin P., Chan; Shun Shing
US Patent 7,616,094 , 2009

Security for the cloud infrastructure: Trusted virtual data center implementation
Stefan Berger, Ram\'on C\'aceres, Kenneth Goldman, Dimitrios Pendarakis, Ronald Perez, Josyula R Rao, Eran Rom, Reiner Sailer, Wayne Schildhauer, Deepa Srinivasan, Sivan Tal, Enriquillo Valdez
IBM Journal of Research and Development 53(4), 6:1--6:12, IBM, 2009

System and method for radio frequency tag group select
S S Chan, C L Cesar, T A Cofino, K A Goldman, S L Greene, H K Heinrich, K P Mcauliffe, E A Hitchcock
US Patent 7,616,094, Google Patents, 2009
US Patent 5,673,037


System and method for radio frequency tag group select
Christian Lenz Cesar, Shun-Shing Chan, Thomas A. Cofino, Kenneth Alan Goldman, Sharon Louise Greene, Harley Kent Heinrich, Kevin P. McAuliffe
US Patent 7,158,046, 2007


vTPM: Virtualizing the Trusted Platform Module
Stefan Berger, Ramon Caceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, Leendert van Doorn
Usenix Security Symposium, July, 2006

Using secure coprocessors for privacy preserving collaborative data mining and analysis
B Bhattacharjee, N Abe, K Goldman, B Zadrozny, V R Chillakuru, M Carpio del, C Apte
Proceedings of the 2nd international workshop on Data management on new hardware, pp. 1, 2006

Linking remote attestation to secure tunnel endpoints
K Goldman, R Perez, R Sailer
Proceedings of the first ACM workshop on Scalable trusted computing, pp. 24, 2006


TPM Main Part 3 IBM Commands
K Goldman, S Berger

Secure Foundations for Mission-Critical Computing
John L. Griffin, Stefan Berger, Kenneth A. Goldman, Trent R. Jaeger, Ronald Perez, David R. Safford, Reiner Sailer, Enriquillo Valdez, Leendert P. Van Doorn, Xiaolan Zhang
CIIP - 2nd Japan/U.S. Workshop on Critical Information Infrastructure Protection, June, 2005


Sampling approach to resource light data mining
N Abe, C Apte, B Bhattacharjee, K Goldman, J Langford, B Zadrozny
SIAM Workshop on Data Mining in Resource Constrained Environments, 2004

Matchbox: Secure data sharing
K Goldman, E Valdez
IEEE Internet Computing 8(6), 18--24, IEEE, 2004


Text Data Mining
B Bhattacharjee, N Abe, K Goldman
Discovery of Important Keywords in the Cyberspace, In Proc, 2001



IBM Multiple-Item Identification Algorithm
H. K. Heinrich, A. Drishna, D. D. Kandlur, D. Friedman, K. A. Goldman, S. S. Chan, T. Cofino
IBM Technical PaperRC20558, 1996