dblp.uni-trier.dewww.uni-trier.de

Lujo Bauer

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
18EELujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea: Real life challenges in access-control management. CHI 2009: 899-908
17EEJay Ligatti, Lujo Bauer, David Walker: Run-Time Enforcement of Nonsafety Policies. ACM Trans. Inf. Syst. Secur. 12(3): (2009)
2008
16EERobert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kelli Bacon, Keisha How, Heather Strong: Expandable grids for visualizing and authoring computer security policies. CHI 2008: 1473-1482
15EELujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea: A user study of policy creation in a flexible access-control system. CHI 2008: 543-552
14EELujo Bauer, Scott Garriss, Michael K. Reiter: Detecting and resolving policy misconfigurations in access-control systems. SACMAT 2008: 185-194
2007
13EELujo Bauer, Scott Garriss, Michael K. Reiter: Efficient Proving for Practical Distributed Access-Control Systems. ESORICS 2007: 19-37
12EEKevin D. Bowers, Lujo Bauer, Deepak Garg, Frank Pfenning, Michael K. Reiter: Consumable Credentials in Linear-Logic-Based Access-Control Systems. NDSS 2007
11EELujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kami Vaniea: Lessons learned from the deployment of a smartphone-based access-control system. SOUPS 2007: 64-75
2006
10EEDeepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter: A Linear Logic of Authorization and Knowledge. ESORICS 2006: 297-312
2005
9EEJay Ligatti, Lujo Bauer, David Walker: Enforcing Non-safety Security Policies with Program Monitors. ESORICS 2005: 355-373
8EELujo Bauer, Scott Garriss, Michael K. Reiter: Distributed Proving in Access-Control Systems. IEEE Symposium on Security and Privacy 2005: 81-95
7EELujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, Peter Rutenbar: Device-Enabled Authorization in the Grey-System. ISC 2005: 431-445
6EELujo Bauer, Jay Ligatti, David Walker: Composing security policies with polymer. PLDI 2005: 305-314
5EEJay Ligatti, Lujo Bauer, David Walker: Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Sec. 4(1-2): 2-16 (2005)
2003
4EELujo Bauer, Michael A. Schneider, Edward W. Felten, Andrew W. Appel: Access Control on the Web Using Proof-carrying Authorization. DISCEX (2) 2003: 117-119
3 Lujo Bauer, Andrew W. Appel, Edward W. Felten: Mechanisms for secure modular programming in Java. Softw., Pract. Exper. 33(5): 461-480 (2003)
2002
2EELujo Bauer, Jarred Ligatti, David Walker: Types and Effects for Non-interfering Program Monitors. ISSS 2002: 154-171
1EELujo Bauer, Michael A. Schneider, Edward W. Felten: A General and Flexible Access-Control System for the Web. USENIX Security Symposium 2002: 93-108

Coauthor Index

1Andrew W. Appel [3] [4]
2Kelli Bacon [16]
3Kevin D. Bowers [10] [12]
4Lorrie Faith Cranor [11] [15] [16] [18]
5Edward W. Felten [1] [3] [4]
6Deepak Garg [10] [12]
7Scott Garriss [7] [8] [13] [14]
8Keisha How [16]
9Jay Ligatti (Jarred Ligatti) [2] [5] [6] [9] [17]
10Jonathan M. McCune [7]
11Frank Pfenning [10] [12]
12Robert W. Reeder [15] [16] [18]
13Michael K. Reiter [7] [8] [10] [11] [12] [13] [14] [15] [16] [18]
14Jason Rouse [7]
15Peter Rutenbar [7]
16Michael A. Schneider [1] [4]
17Heather Strong [16]
18Kami Vaniea [11] [15] [18]
19David Walker [2] [5] [6] [9] [17]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)