Threat modeling as a basis for security requirements S Myagmar, AJ Lee, W Yurcik University of Pittsburgh, 2005 | 455 | 2005 |
NVisionIP: netflow visualizations of system state for security situational awareness K Lakkaraju, W Yurcik, AJ Lee Proceedings of the 2004 ACM workshop on Visualization and data mining for …, 2004 | 376 | 2004 |
Tangible privacy: Towards user-centric sensor designs for bystander privacy I Ahmad, R Farzan, A Kapadia, AJ Lee Proceedings of the ACM on Human-Computer Interaction 4 (CSCW2), 1-28, 2020 | 105 | 2020 |
Toward a threat model for storage systems R Hasan, S Myagmar, AJ Lee, W Yurcik Proceedings of the 2005 ACM workshop on Storage security and survivability …, 2005 | 104 | 2005 |
Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice S Patil, G Norcie, A Kapadia, AJ Lee Symposium on Usable Privacy and Security (SOUPS), 2012 | 100 | 2012 |
On the practicality of cryptographically enforcing dynamic access control policies in the cloud WC Garrison, A Shull, S Myers, AJ Lee 2016 IEEE Symposium on Security and Privacy (SP), 819-838, 2016 | 96 | 2016 |
Eyeing your exposure: quantifying and controlling information sharing for improved privacy R Schlegel, A Kapadia, AJ Lee Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-14, 2011 | 83 | 2011 |
Trustbuilder2: A reconfigurable framework for trust negotiation AJ Lee, M Winslett, KJ Perano Trust Management III: Third IFIP WG 11.11 International Conference, IFIPTM …, 2009 | 68 | 2009 |
Enforcing safety and consistency constraints in policy-based authorization systems AJ Lee, M Winslett ACM Transactions on Information and System Security (TISSEC) 12 (2), 1-33, 2008 | 67 | 2008 |
Reflection or action? How feedback and control affect location sharing decisions S Patil, R Schlegel, A Kapadia, AJ Lee Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014 | 66 | 2014 |
Was my message read? privacy and signaling on Facebook messenger R Hoyle, S Das, A Kapadia, AJ Lee, K Vaniea Proceedings of the 2017 CHI conference on human factors in computing systems …, 2017 | 63 | 2017 |
Interrupt now or inform later? Comparing immediate and delayed privacy feedback S Patil, R Hoyle, R Schlegel, A Kapadia, AJ Lee Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015 | 54 | 2015 |
" Check out where I am!" location-sharing motivations, preferences, and practices S Patil, G Norcie, A Kapadia, A Lee CHI'12 Extended Abstracts on Human Factors in Computing Systems, 1997-2002, 2012 | 53 | 2012 |
Defeasible security policy composition for web services AJ Lee, JP Boyer, LE Olson, CA Gunter Proceedings of the fourth ACM workshop on Formal methods in security, 45-54, 2006 | 52 | 2006 |
Traust: a trust negotiation-based authorization service for open systems AJ Lee, M Winslett, J Basney, V Welch Proceedings of the eleventh ACM symposium on Access control models and …, 2006 | 49 | 2006 |
Safety and consistency in policy-based authorization systems AJ Lee, M Winslett Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 47 | 2006 |
Nexus: Practical and secure access control on untrusted storage platforms using client-side sgx JB Djoko, J Lange, AJ Lee 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019 | 37 | 2019 |
Secured histories: computing group statistics on encrypted data while preserving individual privacy E Rieffel, J Biehl, W van Melle, AJ Lee arXiv preprint arXiv:1012.2152, 2010 | 36 | 2010 |
A privacy-preserving interdomain audit framework AJ Lee, P Tabriz, N Borisov Proceedings of the 5th ACM workshop on Privacy in electronic society, 99-108, 2006 | 35 | 2006 |
NVisionIP: an interactive network flow visualization tool for security K Lakkaraju, W Yurcik, R Bearavolu, AJ Lee 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat …, 2004 | 34 | 2004 |