Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

Pitt Username matches "adamlee"

Displaying results 1 to 20 of 50.
Refine search | New search | 1 | 2 | 3 | Next
Order the results:
Export 50 results as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0
1. Biehl, JT and Rieffel, EG and Lee, AJ (2013) When privacy and utility are in harmony: Towards better design of presence technologies. Personal and Ubiquitous Computing, 17 (3). 503 - 518. ISSN 1617-4909
[img]
2. Lee, AJ and Minami, K and Winslett, M (2010) On the consistency of distributed proofs with hidden subtrees. ACM Transactions on Information and System Security, 13 (3). ISSN 1094-9224
[img]
3. Lee, AJ and Winslett, M (2008) Enforcing safety and consistency constraints in policy-based authorization systems. ACM Transactions on Information and System Security, 12 (2). ISSN 1094-9224
[img]
4. Lee, AJ and Winslett, M and Basney, J and Welch, V (2008) The traust authorization Service. ACM Transactions on Information and System Security, 11 (1). ISSN 1094-9224
[img]
5. Iskander, MK and Lee, AJ and Mosse, D (2012) Confidentiality-preserving and fault-tolerant in-network aggregation for Collaborative WSNs. CollaborateCom 2012 - Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing. 107 - 116.
[img]
6. Etalle, S and Hinrichs, TL and Lee, AJ and Trivellato, D and Zannone, N (2013) Policy administration in tag-based authorization. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7743 L. 162 - 179. ISSN 0302-9743
[img]
7. Patil, S and Norcie, G and Kapadia, A and Lee, AJ (2012) Reasons, rewards, regrets: Privacy considerations in location sharing as an interactive practice. SOUPS 2012 - Proceedings of the 8th Symposium on Usable Privacy and Security.
[img]
8. Le Gall, Y and Lee, AJ and Kapadia, A (2012) PlexC: A policy language for exposure control. In: UNSPECIFIED UNSPECIFIED, 219 - 228. ISBN 9781450312950
[img]
9. Gong, Xi and Yu, Ting and Lee, Adam J (2012) Bounding trust in reputation systems with incomplete information. In: Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12. ACM, New York, 125 - 132. ISBN 978-1-4503-1091-8
[img]
10. Farnan, NL and Lee, AJ and Chrysanthis, PK and Yu, T (2011) Don't reveal my intension: Protecting user privacy using declarative preferences during distributed query processing. In: UNSPECIFIED UNSPECIFIED, 628 - 647. ISBN 9783642238215
[img]
11. Schlegel, R and Kapadia, A and Lee, AJ (2011) Eyeing your exposure: Quantifying and controlling information sharing for improved privacy. In: UNSPECIFIED UNSPECIFIED. ISBN 9781450309110
[img]
12. Rieffel, E and Biehl, J and Van Melle, B and Lee, AJ (2011) Secured histories for presence systems. In: UNSPECIFIED UNSPECIFIED, 446 - 456. ISBN 9781612846378
[img]
13. Minami, K and Borisov, N and Winslett, M and Lee, AJ (2011) Confidentiality-preserving proof theories for distributed proof systems. In: UNSPECIFIED UNSPECIFIED, 145 - 154. ISBN 9781450305648
[img]
14. Adams, AK and Lee, AJ and Mossé, D (2011) Receipt-mode trust negotiation: Efficient authorization through outsourced interactions. In: UNSPECIFIED UNSPECIFIED, 430 - 434. ISBN 9781450305648
[img]
15. Lee, Adam J and Yu, Ting (2010) Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques. In: 2010 23rd IEEE Computer Security Foundations Symposium. IEEE, New York, 139 - 153. ISBN 978-1-4244-7511-7
[img]
16. Wongchaowart, B and Lee, AJ (2010) Oblivious enforcement of hidden information release policies. In: UNSPECIFIED UNSPECIFIED, 324 - 327. ISBN 9781605589367
[img]
17. Lee, Adam J and Yu, Ting and Le Gall, Yann (2010) Effective trust management through a hybrid logical and relational approach. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security - ASIACCS '10. ACM, New York, 169 - 179. ISBN 978-1-60558-936-7
[img]
18. Lee, AJ and Yu, T (2009) Towards a dynamic and composite model of trust. In: UNSPECIFIED UNSPECIFIED, 217 - 226. ISBN 9781605585376
[img]
19. Lee, AJ and Winslett, M and Perano, KJ (2009) TrustBuilder2: A reconfigurable framework for trust negotiation. In: UNSPECIFIED UNSPECIFIED, 176 - 195. ISBN 9783642020551
[img]
20. Lee, AJ and Minami, K and Borisov, N (2009) Confidentiality-preserving distributed proofs of conjunctive queries. In: UNSPECIFIED UNSPECIFIED, 287 - 297. ISBN 9781605583945
[img]
Displaying results 1 to 20 of 50.
Refine search | New search | 1 | 2 | 3 | Next
Order the results: