Author of the publication

The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment.

, , , , , , , , , , , and . POLICY, page 247-249. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conversational Speech Interfaces and Technologies, , and . The Human Computer Interaction Handbook, chapter 19, Lawrence Erlbaum Associates, Mahwah, NJ, 2 edition, (2008)Speech and Language Interfaces, Applications, and Technologies, , , and . The Human Computer Interaction Handbook, chapter 16, CRC Press, Boca Raton, FL, 3 edition, (2012)Personalizing the user experience on ibm.com., , , , and . IBM Syst. J., 42 (4): 686-701 (2003)Designing Natural Language and Structured Entry Methods for Privacy Policy Authoring., , , and . INTERACT, volume 3585 of Lecture Notes in Computer Science, page 671-684. Springer, (2005)Privacy-aware role-based access control., , , , , , and . ACM Trans. Inf. Syst. Secur., 13 (3): 24:1-24:31 (2010)Is ROI an effective approach for persuading decision-makers of the value of user-centered design?, , , , and . CHI Extended Abstracts, page 1168-1169. ACM, (2005)Usable Policy Template Authoring for Iterative Policy Refinement., , , and . POLICY, page 18-21. IEEE Computer Society, (2010)Cost-benefit analysis of iterative usability testing.. INTERACT, page 351-356. North-Holland, (1990)Evaluating assistance of natural language policy authoring., , , , and . SOUPS, page 65-73. ACM, (2008)Usable security and privacy: a case study of developing privacy management tools., , , and . SOUPS, volume 93 of ACM International Conference Proceeding Series, page 35-43. ACM, (2005)