Search

Your search keyword '"Lee, Adam J."' showing total 212 results

Search Constraints

Start Over You searched for: Author "Lee, Adam J." Remove constraint Author: "Lee, Adam J."
212 results on '"Lee, Adam J."'

Search Results

4. Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems

5. On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud (Extended Version)

7. Decomposing, Comparing, and Synthesizing Access Control Expressiveness Simulations (Extended Version)

8. Shoal: Query Optimization and Operator Placement for Access Controlled Stream Processing Systems

10. The Design and Demonstration of an Actor-Based, Application-Aware Access Control Evaluation Framework

11. Ephemeral Communication and Communication Places : What Influences College-Aged Negotiation of Instant Messaging Usage Within App Ecosystems?

13. Secured histories: computing group statistics on encrypted data while preserving individual privacy

19. Bounding Trust under Uncertain Topology Information in Reputation-Based Trust Systems

20. Policy Administration in Tag-Based Authorization

21. My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules

22. TBA : A Hybrid of Logic and Extensional Access Control Systems

23. Trust Management

24. Don’t Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing

31. Traust: A Trust Negotiation Based Authorization Service

32. Virtual Fingerprinting as a Foundation for Reputation in Open Systems

33. Supporting Dynamically Changing Authorizations in Pervasive Communication Systems

44. Tangible Privacy

49. Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud.

Catalog

Books, media, physical & digital resources