Follow
Adam J. Lee
Adam J. Lee
Professor of Computer Science, University of Pittsburgh
Verified email at pitt.edu - Homepage
Title
Cited by
Cited by
Year
Threat modeling as a basis for security requirements
S Myagmar, AJ Lee, W Yurcik
University of Pittsburgh, 2005
4672005
NVisionIP: netflow visualizations of system state for security situational awareness
K Lakkaraju, W Yurcik, AJ Lee
Proceedings of the 2004 ACM workshop on Visualization and data mining for …, 2004
3782004
Tangible privacy: Towards user-centric sensor designs for bystander privacy
I Ahmad, R Farzan, A Kapadia, AJ Lee
Proceedings of the ACM on Human-Computer Interaction 4 (CSCW2), 1-28, 2020
1192020
Toward a threat model for storage systems
R Hasan, S Myagmar, AJ Lee, W Yurcik
Proceedings of the 2005 ACM workshop on Storage security and survivability …, 2005
1082005
On the practicality of cryptographically enforcing dynamic access control policies in the cloud
WC Garrison, A Shull, S Myers, AJ Lee
2016 IEEE Symposium on Security and Privacy (SP), 819-838, 2016
1012016
Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice
S Patil, G Norcie, A Kapadia, AJ Lee
Symposium on Usable Privacy and Security (SOUPS), 2012
1012012
Eyeing your exposure: quantifying and controlling information sharing for improved privacy
R Schlegel, A Kapadia, AJ Lee
Proceedings of the Seventh Symposium on Usable Privacy and Security, 1-14, 2011
862011
Reflection or action? How feedback and control affect location sharing decisions
S Patil, R Schlegel, A Kapadia, AJ Lee
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
682014
Trustbuilder2: A reconfigurable framework for trust negotiation
AJ Lee, M Winslett, KJ Perano
Trust Management III: Third IFIP WG 11.11 International Conference, IFIPTM …, 2009
682009
Enforcing safety and consistency constraints in policy-based authorization systems
AJ Lee, M Winslett
ACM Transactions on Information and System Security (TISSEC) 12 (2), 1-33, 2008
672008
Was my message read? privacy and signaling on Facebook messenger
R Hoyle, S Das, A Kapadia, AJ Lee, K Vaniea
Proceedings of the 2017 CHI conference on human factors in computing systems …, 2017
642017
Interrupt now or inform later? Comparing immediate and delayed privacy feedback
S Patil, R Hoyle, R Schlegel, A Kapadia, AJ Lee
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
572015
" Check out where I am!" location-sharing motivations, preferences, and practices
S Patil, G Norcie, A Kapadia, A Lee
CHI'12 Extended Abstracts on Human Factors in Computing Systems, 1997-2002, 2012
542012
Defeasible security policy composition for web services
AJ Lee, JP Boyer, LE Olson, CA Gunter
Proceedings of the fourth ACM workshop on Formal methods in security, 45-54, 2006
532006
Traust: a trust negotiation-based authorization service for open systems
AJ Lee, M Winslett, J Basney, V Welch
Proceedings of the eleventh ACM symposium on Access control models and …, 2006
492006
Safety and consistency in policy-based authorization systems
AJ Lee, M Winslett
Proceedings of the 13th ACM conference on Computer and communications …, 2006
472006
Nexus: Practical and secure access control on untrusted storage platforms using client-side sgx
JB Djoko, J Lange, AJ Lee
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
402019
Secured histories: computing group statistics on encrypted data while preserving individual privacy
E Rieffel, J Biehl, W van Melle, AJ Lee
arXiv preprint arXiv:1012.2152, 2010
362010
A privacy-preserving interdomain audit framework
AJ Lee, P Tabriz, N Borisov
Proceedings of the 5th ACM workshop on Privacy in electronic society, 99-108, 2006
352006
NVisionIP: an interactive network flow visualization tool for security
K Lakkaraju, W Yurcik, R Bearavolu, AJ Lee
2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat …, 2004
342004
The system can't perform the operation now. Try again later.
Articles 1–20