2009 |
18 | EE | Lujo Bauer,
Lorrie Faith Cranor,
Robert W. Reeder,
Michael K. Reiter,
Kami Vaniea:
Real life challenges in access-control management.
CHI 2009: 899-908 |
17 | EE | Jay Ligatti,
Lujo Bauer,
David Walker:
Run-Time Enforcement of Nonsafety Policies.
ACM Trans. Inf. Syst. Secur. 12(3): (2009) |
2008 |
16 | EE | Robert W. Reeder,
Lujo Bauer,
Lorrie Faith Cranor,
Michael K. Reiter,
Kelli Bacon,
Keisha How,
Heather Strong:
Expandable grids for visualizing and authoring computer security policies.
CHI 2008: 1473-1482 |
15 | EE | Lujo Bauer,
Lorrie Faith Cranor,
Robert W. Reeder,
Michael K. Reiter,
Kami Vaniea:
A user study of policy creation in a flexible access-control system.
CHI 2008: 543-552 |
14 | EE | Lujo Bauer,
Scott Garriss,
Michael K. Reiter:
Detecting and resolving policy misconfigurations in access-control systems.
SACMAT 2008: 185-194 |
2007 |
13 | EE | Lujo Bauer,
Scott Garriss,
Michael K. Reiter:
Efficient Proving for Practical Distributed Access-Control Systems.
ESORICS 2007: 19-37 |
12 | EE | Kevin D. Bowers,
Lujo Bauer,
Deepak Garg,
Frank Pfenning,
Michael K. Reiter:
Consumable Credentials in Linear-Logic-Based Access-Control Systems.
NDSS 2007 |
11 | EE | Lujo Bauer,
Lorrie Faith Cranor,
Michael K. Reiter,
Kami Vaniea:
Lessons learned from the deployment of a smartphone-based access-control system.
SOUPS 2007: 64-75 |
2006 |
10 | EE | Deepak Garg,
Lujo Bauer,
Kevin D. Bowers,
Frank Pfenning,
Michael K. Reiter:
A Linear Logic of Authorization and Knowledge.
ESORICS 2006: 297-312 |
2005 |
9 | EE | Jay Ligatti,
Lujo Bauer,
David Walker:
Enforcing Non-safety Security Policies with Program Monitors.
ESORICS 2005: 355-373 |
8 | EE | Lujo Bauer,
Scott Garriss,
Michael K. Reiter:
Distributed Proving in Access-Control Systems.
IEEE Symposium on Security and Privacy 2005: 81-95 |
7 | EE | Lujo Bauer,
Scott Garriss,
Jonathan M. McCune,
Michael K. Reiter,
Jason Rouse,
Peter Rutenbar:
Device-Enabled Authorization in the Grey-System.
ISC 2005: 431-445 |
6 | EE | Lujo Bauer,
Jay Ligatti,
David Walker:
Composing security policies with polymer.
PLDI 2005: 305-314 |
5 | EE | Jay Ligatti,
Lujo Bauer,
David Walker:
Edit automata: enforcement mechanisms for run-time security policies.
Int. J. Inf. Sec. 4(1-2): 2-16 (2005) |
2003 |
4 | EE | Lujo Bauer,
Michael A. Schneider,
Edward W. Felten,
Andrew W. Appel:
Access Control on the Web Using Proof-carrying Authorization.
DISCEX (2) 2003: 117-119 |
3 | | Lujo Bauer,
Andrew W. Appel,
Edward W. Felten:
Mechanisms for secure modular programming in Java.
Softw., Pract. Exper. 33(5): 461-480 (2003) |
2002 |
2 | EE | Lujo Bauer,
Jarred Ligatti,
David Walker:
Types and Effects for Non-interfering Program Monitors.
ISSS 2002: 154-171 |
1 | EE | Lujo Bauer,
Michael A. Schneider,
Edward W. Felten:
A General and Flexible Access-Control System for the Web.
USENIX Security Symposium 2002: 93-108 |