The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mary Ellen Zurko: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mary Ellen Zurko
    User-Centered Security: Stepping Up to the Grand Challenge. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:187-202 [Conf]
  2. Mary Ellen Zurko, Charlie Kaufman, Katherine Spanbauer, Chuck Bassett
    Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With A Security Decision. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:371-381 [Conf]
  3. Richard Simon, Mary Ellen Zurko
    Separation of Duty in Role-based Environments. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:183-194 [Conf]
  4. Mary Ellen Zurko
    Attribute Support for Inter-Domain Use. [Citation Graph (0, 0)][DBLP]
    CSFW, 1992, pp:179-188 [Conf]
  5. Mary Ellen Zurko
    Panel: What are the Foundations of Computer Security? [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:85-95 [Conf]
  6. Arun Iyengar, Ronald Mraz, Mary Ellen Zurko
    Performance Considerations in Web Security. [Citation Graph (0, 0)][DBLP]
    Certification and Security in E-Services, 2002, pp:57-71 [Conf]
  7. Mary Ellen Zurko
    User-Centered Security. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  8. Mary Ellen Zurko
    Tracking influence through citation index comparisons and preliminary case studies panel position statement. [Citation Graph (0, 0)][DBLP]
    NSPW, 2001, pp:115-117 [Conf]
  9. Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, Clifford E. Kahn
    A VMM Security Kernel for the VAX Architecture. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:2-19 [Conf]
  10. Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
    A User-Centered, Modular Authorization Service Built on an RBAC Foundation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:57-71 [Conf]
  11. Massimo Marchiori, Mary Ellen Zurko, Michael R. Lyu
    Editorial. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2002, v:39, n:5, pp:469-471 [Journal]
  12. Mary Ellen Zurko, Amy R. Greenwald
    Foreword. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2005, v:5, n:1, pp:5-6 [Journal]
  13. Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, Clifford E. Kahn
    A Retrospective on the VAX VMM Security Kernel. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1991, v:17, n:11, pp:1147-1165 [Journal]

  14. Panel: Usable Cryptography: Manifest Destiny or Oxymoron?. [Citation Graph (, )][DBLP]


  15. Adaptive Security Dialogs for Improved Security Behavior of Users. [Citation Graph (, )][DBLP]


  16. Usability meets access control: challenges and research opportunities. [Citation Graph (, )][DBLP]


  17. Technology transfer of successful usable security research into product. [Citation Graph (, )][DBLP]


Search in 0.026secs, Finished in 0.026secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002