Mary Ellen Zurko

According to our database1, Mary Ellen Zurko authored at least 26 papers between 1990 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Usable Security.
IEEE Internet Computing, 2017

Panel: Empirically-based Secure OS Design.
Proceedings of the 2017 New Security Paradigms Workshop, 2017

Developer-centered security and the symmetry of ignorance.
Proceedings of the 2017 New Security Paradigms Workshop, 2017

2016
La Sécurité Ouverte How We Doin? So Far?
Proceedings of the 25th International Conference on World Wide Web, 2016

2012
Lessons from VAX/SVS for High-Assurance VM Systems.
IEEE Security & Privacy, 2012

Someone to watch over me.
Proceedings of the New Security Paradigms Workshop, 2012

2011
Separation of Duties.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2009
Technology transfer of successful usable security research into product.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Usability meets access control: challenges and research opportunities.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Adaptive Security Dialogs for Improved Security Behavior of Users.
Proceedings of the Human-Computer Interaction, 2009

2008
Panel: Usable Cryptography: Manifest Destiny or Oxymoron?.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

2005
Foreword.
Electronic Commerce Research, 2005

User-Centered Security: Stepping Up to the Grand Challenge.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2002
Editorial.
Computer Networks, 2002

Performance Considerations in Web Security.
Proceedings of the Certification and Security in E-Services, From E-Govenment to E-Business, IFIP 17<sup>th</sup> World Computer Congress, 2002

Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With A Security Decision.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Tracking influence through citation index comparisons and preliminary case studies panel position statement.
Proceedings of the New Security Paradigms Workshop 2001, 2001

1999
Jonah: Experience Implementing PKIX Reference Freeware.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999

A User-Centered, Modular Authorization Service Built on an RBAC Foundation.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

User-Centered Security.
Proceedings of the Network and Distributed System Security Symposium, 1999

1997
Separation of Duty in Role-based Environments.
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997

1996
User-centered security.
Proceedings of the 1996 Workshop on New Security Paradigms, 1996

1993
Panel: What are the Foundations of Computer Security?
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993

1992
Attribute Support for Inter-Domain Use.
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992

1991
A Retrospective on the VAX VMM Security Kernel.
IEEE Trans. Software Eng., 1991

1990
A VMM Security Kernel for the VAX Architecture.
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990


  Loading...