Adam J. Lee

Orcid: 0000-0002-2596-7256

According to our database1, Adam J. Lee authored at least 104 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Co-Designing with Users the Explanations for a Proactive Auto-Response Messaging Agent.
Proc. ACM Hum. Comput. Interact., 2023

2022
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud.
ACM Trans. Priv. Secur., 2022

Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and 'Trusted' Platforms.
Proc. ACM Hum. Comput. Interact., 2022

Tangible Privacy for Smart Voice Assistants: Bystanders' Perceptions of Physical Device Controls.
Proc. ACM Hum. Comput. Interact., 2022

Laila is in a Meeting: Design and Evaluation of a Contextual Auto-Response Messaging Agent.
Proceedings of the DIS '22: Designing Interactive Systems Conference, Virtual Event, Australia, June 13, 2022

2021
Context-based Automated Responses of Unavailability in Mobile Messaging.
Comput. Support. Cooperative Work., 2021

Improving Medication Adherence Behaviors Through Personalized, Technology-Powered Interventions.
Proceedings of the Joint Proceedings of the ACM IUI 2021 Workshops co-located with 26th ACM Conference on Intelligent User Interfaces (ACM IUI 2021), 2021

2020
Anchor of trust: towards collusion-resistant trusted indoor location for enterprise and industrial use.
Pers. Ubiquitous Comput., 2020

Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy.
Proc. ACM Hum. Comput. Interact., 2020

MAFIA: Multi-layered Architecture For IoT-based Authentication.
Proceedings of the Second IEEE International Conference on Trust, 2020

Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Adaptive Modelling of Attentiveness to Messaging: A Hybrid Approach.
Proceedings of the 27th ACM Conference on User Modeling, Adaptation and Personalization, 2019

Authorization-aware optimization for multi-provider queries.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Shoal: Query Optimization and Operator Placement for Access Controlled Stream Processing Systems.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

Behind Enemy Lines: Exploring Trusted Data Stream Processing on Untrusted Systems.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Are You There?: Identifying Unavailability in Mobile Messaging.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Sensing or Watching?: Balancing Utility and Privacy in Sensing Systems via Collection and Enforcement Mechanisms.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Ephemeral Communication and Communication Places - What Influences College-Aged Negotiation of Instant Messaging Usage Within App Ecosystems?
Proceedings of the Transforming Digital Worlds - 13th International Conference, 2018

2017
Viewing the Viewers: Publishers' Desires and Viewers' Privacy Concerns in Social Networks.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

Was my message read?: Privacy and Signaling on Facebook Messenger.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

16th Workshop on Privacy in the Electronic Society (WPES 2017).
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Dynamic and Private Cryptographic Access Control for Untrusted Clouds: Costs and Constructions (Extended Version).
CoRR, 2016

On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

PolyStream: Cryptographically Enforced Access Controls for Outsourced Data Stream Processing.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

TPRIVEXEC: Private Execution in Virtual Memory.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Decomposing, Comparing, and Synthesizing Access Control Expressiveness Simulations (Extended Version).
CoRR, 2015

CE-Storm: Confidential Elastic Processing of Data Streams.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

Human Mobility Computing and Privacy: Fad or Reality?
Proceedings of the 16th IEEE International Conference on Mobile Data Management, 2015

Interactive preference-aware query optimization.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

You're where? prove it!: towards trusted indoor location estimation of mobile devices.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

Decomposing, Comparing, and Synthesizing Access Control Expressiveness Simulations.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

CryptStream: Cryptographic Access Controls for Streaming Data.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Interrupt Now or Inform Later?: Comparing Immediate and Delayed Privacy Feedback.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions.
IEEE Trans. Parallel Distributed Syst., 2014

Private aggregation for presence streams.
Future Gener. Comput. Syst., 2014

An actor-based, application-aware access control evaluation framework.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Automated operator placement in distributed Data Stream Management Systems subject to user constraints.
Proceedings of the Workshops Proceedings of the 30th International Conference on Data Engineering Workshops, 2014

PAQO: Preference-aware query optimization for decentralized database systems.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

On the suitability of dissemination-centric access control systems for group-centric sharing.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Reflection or action?: how feedback and control affect location sharing decisions.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
PAQO: A Preference-Aware Query Optimizer for PostgreSQL.
Proc. VLDB Endow., 2013

When privacy and utility are in harmony: towards better design of presence technologies.
Pers. Ubiquitous Comput., 2013

The Design and Demonstration of an Actor-Based, Application-Aware Access Control Evaluation Framework
CoRR, 2013

Bounding Trust under Uncertain Topology Information in Reputation-Based Trust Systems.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013

Enabling intensional access control via preference-aware query optimization.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Combining social authentication and untrusted clouds for private location sharing.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Application-Sensitive Access Control Evaluation Using Parameterized Expressiveness.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

Insured access: an approach to ad-hoc information sharing for virtual organizations.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice.
Proceedings of the Symposium On Usable Privacy and Security, 2012

PlexC: a policy language for exposure control.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

The need for application-aware access control evaluation.
Proceedings of the New Security Paradigms Workshop, 2012

Policy Administration in Tag-Based Authorization.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules.
Proceedings of the Financial Cryptography and Data Security, 2012

Confidentiality-preserving and fault-tolerant in-network aggregation for Collaborative WSNs.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Bounding trust in reputation systems with incomplete information.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

"Check out where I am!": location-sharing motivations, preferences, and practices.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

2011
Trust Management.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Credential-Based Access Control.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Eyeing your exposure: quantifying and controlling information sharing for improved privacy.
Proceedings of the Symposium On Usable Privacy and Security, 2011

TBA : A Hybrid of Logic and Extensional Access Control Systems.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

Enforcing Policy and Data Consistency of Cloud Transactions.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing.
Proceedings of the Computer Security - ESORICS 2011, 2011

Secured histories for presence systems.
Proceedings of the 2011 International Conference on Collaboration Technologies and Systems, 2011

Confidentiality-preserving proof theories for distributed proof systems.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Poster: on trust evaluation with missing information in reputation systems.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Receipt-mode trust negotiation: efficient authorization through outsourced interactions.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
On the consistency of distributed proofs with hidden subtrees.
ACM Trans. Inf. Syst. Secur., 2010

Secured histories: computing group statistics on encrypted data while preserving individual privacy
CoRR, 2010

Investigating privacy-aware distributed query evaluation.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Solving the access-control puzzle: finding the pieces and putting them together.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

Oblivious enforcement of hidden information release policies.
Proceedings of the 5th ACM Symposium on Information, 2010

Effective trust management through a hybrid logical and relational approach.
Proceedings of the 5th ACM Symposium on Information, 2010

Privacy and robustness for data aggregation in wireless sensor networks.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Towards a dynamic and composable model of trust.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

TrustBuilder2: A Reconfigurable Framework for Trust Negotiation.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

Trust negotiation: authorization for virtual organizations.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Confidentiality-preserving distributed proofs of conjunctive queries.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Towards Practical and Secure Decentralized Attribute -Based Authorization Systems
PhD thesis, 2008

The Traust Authorization Service.
ACM Trans. Inf. Syst. Secur., 2008

Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems.
ACM Trans. Inf. Syst. Secur., 2008

Report on the Sixth ACM Workshop on Privacy in the Electronic Society (WPES 2007).
SIGMOD Rec., 2008

Secure aggregation in a publish-subscribe system.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Towards Standards-Compliant Trust Negotiation for Web Services.
Proceedings of the Trust Management II, 2008

Towards an efficient and language-agnostic compliance checker for trust negotiation systems.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Automated Trust Negotiation in Open Systems.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

2006
A privacy-preserving interdomain audit framework.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

Traust: a trust negotiation-based authorization service for open systems.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Traust: A Trust Negotiation Based Authorization Service.
Proceedings of the Trust Management, 4th International Conference, 2006

Virtual Fingerprinting as a Foundation for Reputation in Open Systems.
Proceedings of the Trust Management, 4th International Conference, 2006

Toward an On-Demand Restricted Delegation Mechanism for Grids.
Proceedings of the 7th IEEE/ACM International Conference on Grid Computing (GRID 2006), 2006

Safety and consistency in policy-based authorization systems.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

Defeasible security policy composition for web services.
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, 2006

2005
Defining a Comprehensive Threat Model for High Performance Computational Clusters
CoRR, 2005

Toward a threat model for storage systems.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

Supporting Dynamically Changing Authorizations in Pervasive Communication Systems.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

Searching for open windows and unlocked doors: port scanning in large-scale commodity clusters.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

Cluster security with NVisionCC: process monitoring by leveraging emergent properties.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

2004
NVisionIP: netflow visualizations of system state for security situational awareness.
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004

NVisionIP: an interactive network flow visualization tool for security.
Proceedings of the IEEE International Conference on Systems, 2004


  Loading...