|
Search the dblp DataBase
Lujo Bauer:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Lujo Bauer, Michael A. Schneider, Edward W. Felten, Andrew W. Appel
Access Control on the Web Using Proof-carrying Authorization. [Citation Graph (0, 0)][DBLP] DISCEX (2), 2003, pp:117-119 [Conf]
- Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter
A Linear Logic of Authorization and Knowledge. [Citation Graph (0, 0)][DBLP] ESORICS, 2006, pp:297-312 [Conf]
- Jay Ligatti, Lujo Bauer, David Walker
Enforcing Non-safety Security Policies with Program Monitors. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:355-373 [Conf]
- Lujo Bauer, Jarred Ligatti, David Walker
Types and Effects for Non-interfering Program Monitors. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:154-171 [Conf]
- Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, Peter Rutenbar
Device-Enabled Authorization in the Grey-System. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:431-445 [Conf]
- Lujo Bauer, Jay Ligatti, David Walker
Composing security policies with polymer. [Citation Graph (0, 0)][DBLP] PLDI, 2005, pp:305-314 [Conf]
- Lujo Bauer, Scott Garriss, Michael K. Reiter
Distributed Proving in Access-Control Systems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2005, pp:81-95 [Conf]
- Lujo Bauer, Michael A. Schneider, Edward W. Felten
A General and Flexible Access-Control System for the Web. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2002, pp:93-108 [Conf]
- Jay Ligatti, Lujo Bauer, David Walker
Edit automata: enforcement mechanisms for run-time security policies. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:2-16 [Journal]
- Lujo Bauer, Andrew W. Appel, Edward W. Felten
Mechanisms for secure modular programming in Java. [Citation Graph (0, 0)][DBLP] Softw., Pract. Exper., 2003, v:33, n:5, pp:461-480 [Journal]
- Lujo Bauer, Scott Garriss, Michael K. Reiter
Efficient Proving for Practical Distributed Access-Control Systems. [Citation Graph (0, 0)][DBLP] ESORICS, 2007, pp:19-37 [Conf]
A user study of policy creation in a flexible access-control system. [Citation Graph (, )][DBLP]
Expandable grids for visualizing and authoring computer security policies. [Citation Graph (, )][DBLP]
Real life challenges in access-control management. [Citation Graph (, )][DBLP]
Access control for home data sharing: evaluating social acceptability. [Citation Graph (, )][DBLP]
Constraining Credential Usage in Logic-Based Access Control. [Citation Graph (, )][DBLP]
Consumable Credentials in Linear-Logic-Based Access-Control Systems. [Citation Graph (, )][DBLP]
Solving the access-control puzzle: finding the pieces and putting them together. [Citation Graph (, )][DBLP]
Detecting and resolving policy misconfigurations in access-control systems. [Citation Graph (, )][DBLP]
xDomain: cross-border proofs of access. [Citation Graph (, )][DBLP]
Lessons learned from the deployment of a smartphone-based access-control system. [Citation Graph (, )][DBLP]
Encountering stronger password requirements: user attitudes and behaviors. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs
|