Lujo Bauer
Lujo Bauer
Geverifieerd e-mailadres voor cmu.edu - Homepage
TitelGeciteerd doorJaar
Edit automata: Enforcement mechanisms for run-time security policies
J Ligatti, L Bauer, D Walker
International Journal of Information Security 4 (1-2), 2-16, 2005
3672005
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE Symposium on Security & Privacy, 523-537, 2012
3562012
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011
3302011
Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition
M Sharif, S Bhagavatula, L Bauer, MK Reiter
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
3142016
Encountering stronger password requirements: user attitudes and behaviors
R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ...
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2, 2010
2982010
How does your password measure up? The effect of strength meters on password creation
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
USENIX Security Symposium, 65-80, 2012
2412012
Composing security policies with Polymer
L Bauer, J Ligatti, D Walker
2005 ACM SIGPLAN conference on Programming language design and …, 2005
2152005
Android taint flow analysis for app sets
W Klieber, L Flynn, A Bhosale, L Jia, L Bauer
Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of …, 2014
1892014
Run-time enforcement of nonsafety policies
J Ligatti, L Bauer, D Walker
ACM Transactions on Information and System Security (TISSEC) 12 (3), 19, 2009
1882009
Measuring password guessability for an entire university
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1652013
More enforceable security policies
L Bauer, J Ligatti, D Walker
Proceedings of the Workshop on Foundations of Computer Security (FCS’02 …, 2002
1582002
Expandable grids for visualizing and authoring computer security policies
RW Reeder, L Bauer, LF Cranor, MK Reiter, K Bacon, K How, H Strong
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
1452008
Distributed proving in access-control systems
L Bauer, S Garriss, MK Reiter
2005 IEEE Symposium on Security and Privacy (S&P'05), 81-95, 2005
1372005
Access control for home data sharing: Attitudes, needs and practices
ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010
1292010
A general and flexible access-control system for the web
L Bauer, MA Schneider, EW Felten
USENIX Security Symposium, 93-108, 2002
1272002
Device-enabled authorization in the Grey system
L Bauer, S Garriss, JM McCune, MK Reiter, J Rouse, P Rutenbar
International Conference on Information Security, 431-445, 2005
1252005
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the eighth symposium on usable privacy and security, 7, 2012
1202012
Detecting and resolving policy misconfigurations in access-control systems
L Bauer, S Garriss, MK Reiter
ACM Transactions on Information and System Security (TISSEC) 14 (1), 2, 2011
1142011
Enforcing non-safety security policies with program monitors
J Ligatti, L Bauer, D Walker
European Symposium on Research in Computer Security, 355-373, 2005
1092005
Modeling and enhancing Android’s permission system
E Fragkaki, L Bauer, L Jia, D Swasey
Computer Security–ESORICS 2012, 1-18, 2012
1072012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20