Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Teaching Cybersecurity in CSP (or Any CS Class): Introducing the Security Mindset., , , and . SIGCSE, page 1393. ACM, (2020)Toward Trustworthy AI Development: Mechanisms for Supporting Verifiable Claims., , , , , , , , , and 49 other author(s). CoRR, (2020)Usable Policy Template Authoring for Iterative Policy Refinement., , , and . POLICY, page 18-21. IEEE Computer Society, (2010)Optimizing a policy authoring framework for security and privacy policies., , , and . SOUPS, volume 485 of ACM International Conference Proceeding Series, ACM, (2010)Teaching Cybersecurity: Introducing the Security Mindset., , , and . SIGCSE (2), page 1195. ACM, (2022)When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources., , , , and . SOUPS, page 1:1-1:14. ACM, (2013)Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent., , and . Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, page 131-137. Springer, (2011)RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies., , , , and . UPSEC, USENIX Association, (2008)Policy Management for E-Health Records., and . HealthSec, USENIX Association, (2010)Laissez-faire file sharing: access control designed for individuals at the endpoints., , , and . NSPW, page 1-10. ACM, (2009)