| 2009 | 
|---|
| 18 | EE | Lujo Bauer,
Lorrie Faith Cranor,
Robert W. Reeder,
Michael K. Reiter,
Kami Vaniea:
Real life challenges in access-control management.
CHI 2009: 899-908 | 
| 17 | EE | Jay Ligatti,
Lujo Bauer,
David Walker:
Run-Time Enforcement of Nonsafety Policies.
ACM Trans. Inf. Syst. Secur. 12(3):  (2009) | 
| 2008 | 
|---|
| 16 | EE | Robert W. Reeder,
Lujo Bauer,
Lorrie Faith Cranor,
Michael K. Reiter,
Kelli Bacon,
Keisha How,
Heather Strong:
Expandable grids for visualizing and authoring computer security policies.
CHI 2008: 1473-1482 | 
| 15 | EE | Lujo Bauer,
Lorrie Faith Cranor,
Robert W. Reeder,
Michael K. Reiter,
Kami Vaniea:
A user study of policy creation in a flexible access-control system.
CHI 2008: 543-552 | 
| 14 | EE | Lujo Bauer,
Scott Garriss,
Michael K. Reiter:
Detecting and resolving policy misconfigurations in access-control systems.
SACMAT 2008: 185-194 | 
| 2007 | 
|---|
| 13 | EE | Lujo Bauer,
Scott Garriss,
Michael K. Reiter:
Efficient Proving for Practical Distributed Access-Control Systems.
ESORICS 2007: 19-37 | 
| 12 | EE | Kevin D. Bowers,
Lujo Bauer,
Deepak Garg,
Frank Pfenning,
Michael K. Reiter:
Consumable Credentials in Linear-Logic-Based Access-Control Systems.
NDSS 2007 | 
| 11 | EE | Lujo Bauer,
Lorrie Faith Cranor,
Michael K. Reiter,
Kami Vaniea:
Lessons learned from the deployment of a smartphone-based access-control system.
SOUPS 2007: 64-75 | 
| 2006 | 
|---|
| 10 | EE | Deepak Garg,
Lujo Bauer,
Kevin D. Bowers,
Frank Pfenning,
Michael K. Reiter:
A Linear Logic of Authorization and Knowledge.
ESORICS 2006: 297-312 | 
| 2005 | 
|---|
| 9 | EE | Jay Ligatti,
Lujo Bauer,
David Walker:
Enforcing Non-safety Security Policies with Program Monitors.
ESORICS 2005: 355-373 | 
| 8 | EE | Lujo Bauer,
Scott Garriss,
Michael K. Reiter:
Distributed Proving in Access-Control Systems.
IEEE Symposium on Security and Privacy 2005: 81-95 | 
| 7 | EE | Lujo Bauer,
Scott Garriss,
Jonathan M. McCune,
Michael K. Reiter,
Jason Rouse,
Peter Rutenbar:
Device-Enabled Authorization in the Grey-System.
ISC 2005: 431-445 | 
| 6 | EE | Lujo Bauer,
Jay Ligatti,
David Walker:
Composing security policies with polymer.
PLDI 2005: 305-314 | 
| 5 | EE | Jay Ligatti,
Lujo Bauer,
David Walker:
Edit automata: enforcement mechanisms for run-time security policies.
Int. J. Inf. Sec. 4(1-2): 2-16 (2005) | 
| 2003 | 
|---|
| 4 | EE | Lujo Bauer,
Michael A. Schneider,
Edward W. Felten,
Andrew W. Appel:
Access Control on the Web Using Proof-carrying Authorization.
DISCEX (2) 2003: 117-119 | 
| 3 |  | Lujo Bauer,
Andrew W. Appel,
Edward W. Felten:
Mechanisms for secure modular programming in Java.
Softw., Pract. Exper. 33(5): 461-480 (2003) | 
| 2002 | 
|---|
| 2 | EE | Lujo Bauer,
Jarred Ligatti,
David Walker:
Types and Effects for Non-interfering Program Monitors.
ISSS 2002: 154-171 | 
| 1 | EE | Lujo Bauer,
Michael A. Schneider,
Edward W. Felten:
A General and Flexible Access-Control System for the Web.
USENIX Security Symposium 2002: 93-108 |