Seguir
Adam J. Lee
Adam J. Lee
Professor of Computer Science, University of Pittsburgh
Dirección de correo verificada de pitt.edu - Página principal
Título
Citado por
Citado por
Año
Threat modeling as a basis for security requirements
S Myagmar, AJ Lee, W Yurcik
University of Pittsburgh, 2005
4712005
NVisionIP: netflow visualizations of system state for security situational awareness
K Lakkaraju, W Yurcik, AJ Lee
Proceedings of the 2004 ACM workshop on Visualization and data mining for …, 2004
3812004
Tangible privacy: Towards user-centric sensor designs for bystander privacy
I Ahmad, R Farzan, A Kapadia, AJ Lee
Proceedings of the ACM on Human-Computer Interaction 4 (CSCW2), 1-28, 2020
1212020
Toward a threat model for storage systems
R Hasan, S Myagmar, AJ Lee, W Yurcik
Proceedings of the 2005 ACM workshop on Storage security and survivability …, 2005
1082005
On the practicality of cryptographically enforcing dynamic access control policies in the cloud
WC Garrison, A Shull, S Myers, AJ Lee
2016 IEEE Symposium on Security and Privacy (SP), 819-838, 2016
1032016
Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice
S Patil, G Norcie, A Kapadia, AJ Lee
Symposium on Usable Privacy and Security (SOUPS), 2012
1022012
Eyeing your exposure: quantifying and controlling information sharing for improved privacy
R Schlegel, A Kapadia, AJ Lee
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-14, 2011
872011
Reflection or action? How feedback and control affect location sharing decisions
S Patil, R Schlegel, A Kapadia, AJ Lee
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
692014
Trustbuilder2: A reconfigurable framework for trust negotiation
AJ Lee, M Winslett, KJ Perano
Trust Management III: Third IFIP WG 11.11 International Conference, IFIPTM …, 2009
682009
Enforcing safety and consistency constraints in policy-based authorization systems
AJ Lee, M Winslett
ACM Transactions on Information and System Security (TISSEC) 12 (2), 1-33, 2008
672008
Was my message read? privacy and signaling on Facebook messenger
R Hoyle, S Das, A Kapadia, AJ Lee, K Vaniea
Proceedings of the 2017 CHI conference on human factors in computing systems …, 2017
652017
Interrupt now or inform later? Comparing immediate and delayed privacy feedback
S Patil, R Hoyle, R Schlegel, A Kapadia, AJ Lee
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
582015
" Check out where I am!" location-sharing motivations, preferences, and practices
S Patil, G Norcie, A Kapadia, A Lee
CHI'12 Extended Abstracts on Human Factors in Computing Systems, 1997-2002, 2012
542012
Defeasible security policy composition for web services
AJ Lee, JP Boyer, LE Olson, CA Gunter
Proceedings of the fourth ACM workshop on Formal methods in security, 45-54, 2006
532006
Traust: a trust negotiation-based authorization service for open systems
AJ Lee, M Winslett, J Basney, V Welch
Proceedings of the eleventh ACM symposium on Access control models and …, 2006
492006
Safety and consistency in policy-based authorization systems
AJ Lee, M Winslett
Proceedings of the 13th ACM conference on Computer and communications …, 2006
472006
Nexus: Practical and secure access control on untrusted storage platforms using client-side sgx
JB Djoko, J Lange, AJ Lee
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
422019
Secured histories: computing group statistics on encrypted data while preserving individual privacy
E Rieffel, J Biehl, W van Melle, AJ Lee
arXiv preprint arXiv:1012.2152, 2010
362010
A privacy-preserving interdomain audit framework
AJ Lee, P Tabriz, N Borisov
Proceedings of the 5th ACM workshop on Privacy in electronic society, 99-108, 2006
352006
NVisionIP: an interactive network flow visualization tool for security
K Lakkaraju, W Yurcik, R Bearavolu, AJ Lee
2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat …, 2004
342004
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20