Daniel J. Weitzner

According to our database1, Daniel J. Weitzner authored at least 47 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Mind the Gap: Securely modeling cyber risk based on security deviations from a peer group.
CoRR, 2024

Municipal cyber risk modeling using cryptographic computing to inform cyber policymaking.
CoRR, 2024

2023
What the World Needs to Keep Learning from Tim Berners-Lee's Creation of the Web.
Proceedings of the Linking the World's Information, 2023

Web Science: An Interdisciplinary Approach to Understanding the Web.
Proceedings of the Linking the World's Information, 2023

2021
You Really Shouldn't Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries.
CoRR, 2021

2020
Privacy-Preserving Automated Exposure Notification.
IACR Cryptol. ePrint Arch., 2020

SonicPACT: An Ultrasonic Ranging Method for the Private Automated Contact Tracing (PACT) Protocol.
CoRR, 2020

The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
SchengenDB: A Data Protection Database Proposal.
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2019

2018
Practical Accountability of Secret Processes.
IACR Cryptol. ePrint Arch., 2018

On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do (Transcript of Discussion).
Proceedings of the Security Protocols XXVI, 2018

On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do.
Proceedings of the Security Protocols XXVI, 2018

2017
Better the Devil You Know: Exposing the Data Sharing Practices of Smartphone Apps.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

My Bank Already Gets this Data: Exposure Minimisation and Company Relationships in Privacy Decision-Making.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Towards a Privacy Research Roadmap for the Computing Community.
CoRR, 2016

2015
Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecur., 2015

Keys under doormats.
Commun. ACM, 2015

Privacy Tipping Points in Smartphones Privacy Preferences.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
Improving User Choice Through Better Mobile Apps Transparency and Permissions Analysis.
J. Priv. Confidentiality, 2014

Can apps play by the COPPA Rules?
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

No technical understanding required: helping users make informed choices about access to their personal data.
Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, 2014

2013
No surprises: measuring intrusiveness of smartphone applications by detecting objective context deviations.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

2011
Accountability and deterrence in online life.
Proceedings of the Web Science 2011, 2011

2010
Developing the national communications and information infrastructure.
Internet Res., 2010

2009
Interacting with eHealth: towards grand challenges for HCI.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
Net Neutrality... Seriously this Time.
IEEE Internet Comput., 2008

Information accountability.
Commun. ACM, 2008

Web science: an interdisciplinary approach to understanding the web.
Commun. ACM, 2008

Using Dependency Tracking to Provide Explanations for Policy Management.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

2007
Google, Profiling, and Privacy.
IEEE Internet Comput., 2007

Beyond Secrecy: New Privacy Protection Strategies for Open Information Spaces.
IEEE Internet Comput., 2007

Whose Name Is It, Anyway? Decentralized Identity Systems on the Web.
IEEE Internet Comput., 2007

Free Speech and Child Protection on the Web.
IEEE Internet Comput., 2007

From Home to Home Page: New Challenges to Basic Notions of Privacy and Property.
IEEE Internet Comput., 2007

Twelve Billion Bargaining Chips: The Web Side of the Net Neutrality Debate.
IEEE Internet Comput., 2007

Beyond Secrecy: New Privacy Protection Strategies for the World Wide Web.
Proceedings of the ISWC'07 Workshop on Privacy Enforcement and Accountability with Semantics (PEAS 2007), 2007

Data-Purpose Algebra: Modeling Data Usage Policies.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Personal Privacy without Computational Obscurity: Rethinking Privacy Protection Strategies for Open Information Networks.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
In Search of Manageable Identity Systems.
IEEE Internet Comput., 2006

A Framework for Web Science.
Found. Trends Web Sci., 2006

Broken links on the web: local laws and the global free flow of information.
Proceedings of the 15th international conference on World Wide Web, 2006

Self-Describing Delegation Networks for the Web.
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006

Transparent Accountable Data Mining: New Strategies for Privacy Protection.
Proceedings of the Semantic Web Meets eGovernment, 2006

Using Semantic Web Technologies for Policy Management on the Web.
Proceedings of the Proceedings, 2006

2005
Semantic Web Public Policy Challenges: Privacy, Provenance, Property and Personhood.
Proceedings of the Semantic Web - ISWC 2005, 4th International Semantic Web Conference, 2005

2001
Privacy in Context.
Hum. Comput. Interact., 2001

1997
Directing Policy-Making Beyond the Net's Metaphor.
Commun. ACM, 1997


  Loading...