212 results on '"Lee, Adam J."'
Search Results
2. "I know what you did last semester": Understanding Privacy Expectations and Preferences in the Smart Campus
3. Understanding Perceived Utility and Comfort of In-Home General-Purpose Sensing through Progressive Exposure
4. Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems
5. On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud (Extended Version)
6. Context-based Automated Responses of Unavailability in Mobile Messaging
7. Decomposing, Comparing, and Synthesizing Access Control Expressiveness Simulations (Extended Version)
8. Shoal: Query Optimization and Operator Placement for Access Controlled Stream Processing Systems
9. Anchor of trust: towards collusion-resistant trusted indoor location for enterprise and industrial use
10. The Design and Demonstration of an Actor-Based, Application-Aware Access Control Evaluation Framework
11. Ephemeral Communication and Communication Places : What Influences College-Aged Negotiation of Instant Messaging Usage Within App Ecosystems?
12. Dynamic Access Control Using Identity-Based Encryption
13. Secured histories: computing group statistics on encrypted data while preserving individual privacy
14. Co-Designing with Users the Explanations for a Proactive Auto-Response Messaging Agent
15. Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems
16. Toward the Design of Sensing-Based Medication Adherence Aids That Support Individualized Activities of Daily Living: Survey and Interviews With Patients and Providers
17. Shoal: Query Optimization and Operator Placement for Access Controlled Stream Processing Systems
18. Ephemeral Communication and Communication Places
19. Bounding Trust under Uncertain Topology Information in Reputation-Based Trust Systems
20. Policy Administration in Tag-Based Authorization
21. My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules
22. TBA : A Hybrid of Logic and Extensional Access Control Systems
23. Trust Management
24. Don’t Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing
25. Tangible Privacy for Smart Voice Assistants: Bystanders' Perceptions of Physical Device Controls
26. Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and 'Trusted' Platforms
27. Private aggregation for presence streams
28. TrustBuilder2: A Reconfigurable Framework for Trust Negotiation
29. Towards Standards-Compliant Trust Negotiation for Web Services
30. Automated Trust Negotiation in Open Systems
31. Traust: A Trust Negotiation Based Authorization Service
32. Virtual Fingerprinting as a Foundation for Reputation in Open Systems
33. Supporting Dynamically Changing Authorizations in Pervasive Communication Systems
34. Laila is in a Meeting: Design and Evaluation of a Contextual Auto-Response Messaging Agent
35. Toward the Design of Sensing-Based Medication Adherence Aids That Support Individualized Activities of Daily Living: Survey and Interviews With Patients and Providers (Preprint)
36. Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud
37. When privacy and utility are in harmony: towards better design of presence technologies
38. Credential-Based Access Control
39. Bounding Trust under Uncertain Topology Information in Reputation-Based Trust Systems
40. Policy Administration in Tag-Based Authorization
41. My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules
42. Don’t Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing
43. TrustBuilder2: A Reconfigurable Framework for Trust Negotiation
44. Tangible Privacy
45. Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization
46. MAFIA: Multi-layered Architecture For IoT-based Authentication
47. Making sense of risk in an increasingly cyber‐physical world
48. Supporting Dynamically Changing Authorizations in Pervasive Communication Systems
49. Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud.
50. Adaptive Modelling of Attentiveness to Messaging
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.