Adam J. Lee

According to our database1, Adam J. Lee
  • authored at least 85 papers between 2004 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Sensing or Watching?: Balancing Utility and Privacy in Sensing Systems via Collection and Enforcement Mechanisms.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Ephemeral Communication and Communication Places - What Influences College-Aged Negotiation of Instant Messaging Usage Within App Ecosystems?
Proceedings of the Transforming Digital Worlds - 13th International Conference, 2018

2017
Viewing the Viewers: Publishers' Desires and Viewers' Privacy Concerns in Social Networks.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

Was my message read?: Privacy and Signaling on Facebook Messenger.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

16th Workshop on Privacy in the Electronic Society (WPES 2017).
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Dynamic and Private Cryptographic Access Control for Untrusted Clouds: Costs and Constructions (Extended Version).
CoRR, 2016

On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

PolyStream: Cryptographically Enforced Access Controls for Outsourced Data Stream Processing.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

TPRIVEXEC: Private Execution in Virtual Memory.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Decomposing, Comparing, and Synthesizing Access Control Expressiveness Simulations (Extended Version).
CoRR, 2015

CE-Storm: Confidential Elastic Processing of Data Streams.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

Human Mobility Computing and Privacy: Fad or Reality?
Proceedings of the 16th IEEE International Conference on Mobile Data Management, 2015

Interactive preference-aware query optimization.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

You're where? prove it!: towards trusted indoor location estimation of mobile devices.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

Decomposing, Comparing, and Synthesizing Access Control Expressiveness Simulations.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

CryptStream: Cryptographic Access Controls for Streaming Data.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Interrupt Now or Inform Later?: Comparing Immediate and Delayed Privacy Feedback.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions.
IEEE Trans. Parallel Distrib. Syst., 2014

Private aggregation for presence streams.
Future Generation Comp. Syst., 2014

An actor-based, application-aware access control evaluation framework.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Automated operator placement in distributed Data Stream Management Systems subject to user constraints.
Proceedings of the Workshops Proceedings of the 30th International Conference on Data Engineering Workshops, 2014

PAQO: Preference-aware query optimization for decentralized database systems.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

On the suitability of dissemination-centric access control systems for group-centric sharing.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Reflection or action?: how feedback and control affect location sharing decisions.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
PAQO: A Preference-Aware Query Optimizer for PostgreSQL.
PVLDB, 2013

When privacy and utility are in harmony: towards better design of presence technologies.
Personal and Ubiquitous Computing, 2013

The Design and Demonstration of an Actor-Based, Application-Aware Access Control Evaluation Framework
CoRR, 2013

Bounding Trust under Uncertain Topology Information in Reputation-Based Trust Systems.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013

Enabling intensional access control via preference-aware query optimization.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Combining social authentication and untrusted clouds for private location sharing.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Application-Sensitive Access Control Evaluation Using Parameterized Expressiveness.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

Insured access: an approach to ad-hoc information sharing for virtual organizations.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice.
Proceedings of the Symposium On Usable Privacy and Security, 2012

PlexC: a policy language for exposure control.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

The need for application-aware access control evaluation.
Proceedings of the New Security Paradigms Workshop, 2012

Policy Administration in Tag-Based Authorization.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules.
Proceedings of the Financial Cryptography and Data Security, 2012

Confidentiality-preserving and fault-tolerant in-network aggregation for Collaborative WSNs.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Bounding trust in reputation systems with incomplete information.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

"Check out where I am!": location-sharing motivations, preferences, and practices.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

2011
Trust Management.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Credential-Based Access Control.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Eyeing your exposure: quantifying and controlling information sharing for improved privacy.
Proceedings of the Symposium On Usable Privacy and Security, 2011

TBA : A Hybrid of Logic and Extensional Access Control Systems.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

Enforcing Policy and Data Consistency of Cloud Transactions.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing.
Proceedings of the Computer Security - ESORICS 2011, 2011

Secured histories for presence systems.
Proceedings of the 2011 International Conference on Collaboration Technologies and Systems, 2011

Confidentiality-preserving proof theories for distributed proof systems.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Poster: on trust evaluation with missing information in reputation systems.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Receipt-mode trust negotiation: efficient authorization through outsourced interactions.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
On the consistency of distributed proofs with hidden subtrees.
ACM Trans. Inf. Syst. Secur., 2010

Secured histories: computing group statistics on encrypted data while preserving individual privacy
CoRR, 2010

Investigating privacy-aware distributed query evaluation.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Solving the access-control puzzle: finding the pieces and putting them together.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

Oblivious enforcement of hidden information release policies.
Proceedings of the 5th ACM Symposium on Information, 2010

Effective trust management through a hybrid logical and relational approach.
Proceedings of the 5th ACM Symposium on Information, 2010

Privacy and robustness for data aggregation in wireless sensor networks.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Towards a dynamic and composable model of trust.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

TrustBuilder2: A Reconfigurable Framework for Trust Negotiation.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

Trust negotiation: authorization for virtual organizations.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Confidentiality-preserving distributed proofs of conjunctive queries.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
The Traust Authorization Service.
ACM Trans. Inf. Syst. Secur., 2008

Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems.
ACM Trans. Inf. Syst. Secur., 2008

Report on the Sixth ACM Workshop on Privacy in the Electronic Society (WPES 2007).
SIGMOD Record, 2008

Secure aggregation in a publish-subscribe system.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Towards Standards-Compliant Trust Negotiation for Web Services.
Proceedings of the Trust Management II, 2008

Towards an efficient and language-agnostic compliance checker for trust negotiation systems.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Automated Trust Negotiation in Open Systems.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

2006
A privacy-preserving interdomain audit framework.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

Traust: a trust negotiation-based authorization service for open systems.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Traust: A Trust Negotiation Based Authorization Service.
Proceedings of the Trust Management, 4th International Conference, 2006

Virtual Fingerprinting as a Foundation for Reputation in Open Systems.
Proceedings of the Trust Management, 4th International Conference, 2006

Toward an On-Demand Restricted Delegation Mechanism for Grids.
Proceedings of the 7th IEEE/ACM International Conference on Grid Computing (GRID 2006), 2006

Safety and consistency in policy-based authorization systems.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

Defeasible security policy composition for web services.
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, 2006

2005
Defining a Comprehensive Threat Model for High Performance Computational Clusters
CoRR, 2005

Toward a threat model for storage systems.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

Supporting Dynamically Changing Authorizations in Pervasive Communication Systems.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

Searching for open windows and unlocked doors: port scanning in large-scale commodity clusters.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

Cluster security with NVisionCC: process monitoring by leveraging emergent properties.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

2004
NVisionIP: netflow visualizations of system state for security situational awareness.
Proceedings of the Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC 2004), 2004

NVisionIP: an interactive network flow visualization tool for security.
Proceedings of the IEEE International Conference on Systems, 2004


  Loading...