Adam J. Lee
Adam J. Lee
Associate Professor of Computer Science, University of Pittsburgh
Verifierad e-postadress på cs.pitt.edu - Startsida
Titel
Citeras av
Citeras av
År
NVisionIP: netflow visualizations of system state for security situational awareness
K Lakkaraju, W Yurcik, AJ Lee
Proceedings of the 2004 ACM workshop on Visualization and data mining for …, 2004
3442004
Threat modeling as a basis for security requirements
S Myagmar, AJ Lee, W Yurcik
Symposium on requirements engineering for information security (SREIS) 2005, 1-8, 2005
3292005
Toward a threat model for storage systems
R Hasan, S Myagmar, AJ Lee, W Yurcik
Proceedings of the 2005 ACM workshop on Storage security and survivability …, 2005
782005
Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice
S Patil, G Norcie, A Kapadia, AJ Lee
Symposium on Usable Privacy and Security (SOUPS), 2012
752012
On the practicality of cryptographically enforcing dynamic access control policies in the cloud
WC Garrison, A Shull, S Myers, AJ Lee
2016 IEEE Symposium on Security and Privacy (SP), 819-838, 2016
662016
Eyeing your exposure: quantifying and controlling information sharing for improved privacy
R Schlegel, A Kapadia, AJ Lee
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-14, 2011
622011
Trustbuilder2: A reconfigurable framework for trust negotiation
AJ Lee, M Winslett, KJ Perano
IFIP International Conference on Trust Management, 176-195, 2009
622009
Enforcing safety and consistency constraints in policy-based authorization systems
AJ Lee, M Winslett
ACM Transactions on Information and System Security (TISSEC) 12 (2), 1-33, 2008
572008
Defeasible security policy composition for web services
AJ Lee, JP Boyer, LE Olson, CA Gunter
Proceedings of the fourth ACM workshop on Formal methods in security, 45-54, 2006
462006
Reflection or action? how feedback and control affect location sharing decisions
S Patil, R Schlegel, A Kapadia, AJ Lee
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
452014
Traust: a trust negotiation-based authorization service for open systems
AJ Lee, M Winslett, J Basney, V Welch
Proceedings of the eleventh ACM symposium on Access control models and …, 2006
452006
Safety and consistency in policy-based authorization systems
AJ Lee, M Winslett
Proceedings of the 13th ACM conference on Computer and communications …, 2006
442006
" Check out where I am!" location-sharing motivations, preferences, and practices
S Patil, G Norcie, A Kapadia, A Lee
CHI'12 Extended Abstracts on Human Factors in Computing Systems, 1997-2002, 2012
422012
Towards a dynamic and composable model of trust
AJ Lee, T Yu
Proceedings of the 14th ACM symposium on Access control models and …, 2009
312009
Secure aggregation in a publish-subscribe system
K Minami, AJ Lee, M Winslett, N Borisov
Proceedings of the 7th ACM workshop on Privacy in the electronic society, 95-104, 2008
312008
NVisionIP: an interactive network flow visualization tool for security
K Lakkaraju, W Yurcik, R Bearavolu, AJ Lee
2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat …, 2004
312004
Interrupt now or inform later? Comparing immediate and delayed privacy feedback
S Patil, R Hoyle, R Schlegel, A Kapadia, AJ Lee
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
302015
Secured histories: computing group statistics on encrypted data while preserving individual privacy
E Rieffel, J Biehl, W van Melle, AJ Lee
arXiv preprint arXiv:1012.2152, 2010
272010
A privacy-preserving interdomain audit framework
AJ Lee, P Tabriz, N Borisov
Proceedings of the 5th ACM workshop on Privacy in electronic society, 99-108, 2006
272006
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
AJ Lee, M Winslett
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
262008
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20