关注
Adam J. Lee
Adam J. Lee
Professor of Computer Science, University of Pittsburgh
在 pitt.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Threat modeling as a basis for security requirements
S Myagmar, AJ Lee, W Yurcik
University of Pittsburgh, 2005
4552005
NVisionIP: netflow visualizations of system state for security situational awareness
K Lakkaraju, W Yurcik, AJ Lee
Proceedings of the 2004 ACM workshop on Visualization and data mining for …, 2004
3762004
Tangible privacy: Towards user-centric sensor designs for bystander privacy
I Ahmad, R Farzan, A Kapadia, AJ Lee
Proceedings of the ACM on Human-Computer Interaction 4 (CSCW2), 1-28, 2020
1052020
Toward a threat model for storage systems
R Hasan, S Myagmar, AJ Lee, W Yurcik
Proceedings of the 2005 ACM workshop on Storage security and survivability …, 2005
1042005
Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice
S Patil, G Norcie, A Kapadia, AJ Lee
Symposium on Usable Privacy and Security (SOUPS), 2012
1002012
On the practicality of cryptographically enforcing dynamic access control policies in the cloud
WC Garrison, A Shull, S Myers, AJ Lee
2016 IEEE Symposium on Security and Privacy (SP), 819-838, 2016
962016
Eyeing your exposure: quantifying and controlling information sharing for improved privacy
R Schlegel, A Kapadia, AJ Lee
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-14, 2011
832011
Trustbuilder2: A reconfigurable framework for trust negotiation
AJ Lee, M Winslett, KJ Perano
Trust Management III: Third IFIP WG 11.11 International Conference, IFIPTM …, 2009
682009
Enforcing safety and consistency constraints in policy-based authorization systems
AJ Lee, M Winslett
ACM Transactions on Information and System Security (TISSEC) 12 (2), 1-33, 2008
672008
Reflection or action? How feedback and control affect location sharing decisions
S Patil, R Schlegel, A Kapadia, AJ Lee
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
662014
Was my message read? privacy and signaling on Facebook messenger
R Hoyle, S Das, A Kapadia, AJ Lee, K Vaniea
Proceedings of the 2017 CHI conference on human factors in computing systems …, 2017
632017
Interrupt now or inform later? Comparing immediate and delayed privacy feedback
S Patil, R Hoyle, R Schlegel, A Kapadia, AJ Lee
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
542015
" Check out where I am!" location-sharing motivations, preferences, and practices
S Patil, G Norcie, A Kapadia, A Lee
CHI'12 Extended Abstracts on Human Factors in Computing Systems, 1997-2002, 2012
532012
Defeasible security policy composition for web services
AJ Lee, JP Boyer, LE Olson, CA Gunter
Proceedings of the fourth ACM workshop on Formal methods in security, 45-54, 2006
522006
Traust: a trust negotiation-based authorization service for open systems
AJ Lee, M Winslett, J Basney, V Welch
Proceedings of the eleventh ACM symposium on Access control models and …, 2006
492006
Safety and consistency in policy-based authorization systems
AJ Lee, M Winslett
Proceedings of the 13th ACM conference on Computer and communications …, 2006
472006
Nexus: Practical and secure access control on untrusted storage platforms using client-side sgx
JB Djoko, J Lange, AJ Lee
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
372019
Secured histories: computing group statistics on encrypted data while preserving individual privacy
E Rieffel, J Biehl, W van Melle, AJ Lee
arXiv preprint arXiv:1012.2152, 2010
362010
A privacy-preserving interdomain audit framework
AJ Lee, P Tabriz, N Borisov
Proceedings of the 5th ACM workshop on Privacy in electronic society, 99-108, 2006
352006
NVisionIP: an interactive network flow visualization tool for security
K Lakkaraju, W Yurcik, R Bearavolu, AJ Lee
2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat …, 2004
342004
系统目前无法执行此操作,请稍后再试。
文章 1–20