The SCEAS System
Navigation Menu

Search the dblp DataBase


Lujo Bauer: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lujo Bauer, Michael A. Schneider, Edward W. Felten, Andrew W. Appel
    Access Control on the Web Using Proof-carrying Authorization. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:117-119 [Conf]
  2. Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter
    A Linear Logic of Authorization and Knowledge. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:297-312 [Conf]
  3. Jay Ligatti, Lujo Bauer, David Walker
    Enforcing Non-safety Security Policies with Program Monitors. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:355-373 [Conf]
  4. Lujo Bauer, Jarred Ligatti, David Walker
    Types and Effects for Non-interfering Program Monitors. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:154-171 [Conf]
  5. Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, Peter Rutenbar
    Device-Enabled Authorization in the Grey-System. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:431-445 [Conf]
  6. Lujo Bauer, Jay Ligatti, David Walker
    Composing security policies with polymer. [Citation Graph (0, 0)][DBLP]
    PLDI, 2005, pp:305-314 [Conf]
  7. Lujo Bauer, Scott Garriss, Michael K. Reiter
    Distributed Proving in Access-Control Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:81-95 [Conf]
  8. Lujo Bauer, Michael A. Schneider, Edward W. Felten
    A General and Flexible Access-Control System for the Web. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:93-108 [Conf]
  9. Jay Ligatti, Lujo Bauer, David Walker
    Edit automata: enforcement mechanisms for run-time security policies. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:2-16 [Journal]
  10. Lujo Bauer, Andrew W. Appel, Edward W. Felten
    Mechanisms for secure modular programming in Java. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2003, v:33, n:5, pp:461-480 [Journal]
  11. Lujo Bauer, Scott Garriss, Michael K. Reiter
    Efficient Proving for Practical Distributed Access-Control Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:19-37 [Conf]

  12. A user study of policy creation in a flexible access-control system. [Citation Graph (, )][DBLP]

  13. Expandable grids for visualizing and authoring computer security policies. [Citation Graph (, )][DBLP]

  14. Real life challenges in access-control management. [Citation Graph (, )][DBLP]

  15. Access control for home data sharing: evaluating social acceptability. [Citation Graph (, )][DBLP]

  16. Constraining Credential Usage in Logic-Based Access Control. [Citation Graph (, )][DBLP]

  17. Consumable Credentials in Linear-Logic-Based Access-Control Systems. [Citation Graph (, )][DBLP]

  18. Solving the access-control puzzle: finding the pieces and putting them together. [Citation Graph (, )][DBLP]

  19. Detecting and resolving policy misconfigurations in access-control systems. [Citation Graph (, )][DBLP]

  20. xDomain: cross-border proofs of access. [Citation Graph (, )][DBLP]

  21. Lessons learned from the deployment of a smartphone-based access-control system. [Citation Graph (, )][DBLP]

  22. Encountering stronger password requirements: user attitudes and behaviors. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002