Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The effects of introspection on creating privacy policy., , and . WPES, page 1-10. ACM, (2009)Preventative Directions For Insider Threat Mitigation Via Access Control., and . Insider Attack and Cyber Security, volume 39 of Advances in Information Security, Springer, (2008)What's Wrong with Access Control in the Real World?, and . IEEE Secur. Priv., 8 (4): 74-77 (2010)PorKI: Portable PKI Credentials via Proxy Certificates., , and . EuroPKI, volume 6711 of Lecture Notes in Computer Science, page 1-16. Springer, (2010)Information Risk in Financial Institutions: Field Study and Research Roadmap., , , , and . FinanceCom, volume 4 of Lecture Notes in Business Information Processing, page 165-180. Springer, (2007)The TIPPI Point: Toward Trustworthy Interfaces., and . IEEE Secur. Priv., 3 (4): 68-71 (2005)PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness., and . ACSAC, page 419-430. IEEE Computer Society, (2005)Access Control In and For the Real World.. Dartmouth College, USA, (2013)