|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 50 occurrences of 30 keywords
|
|
|
Results
Found 24 publication records. Showing 24 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
107 | Robert W. Reeder, Clare-Marie Karat, John Karat, Carolyn Brodie |
Usability Challenges in Security and Privacy Policy-Authoring Interfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTERACT (2) ![In: Human-Computer Interaction - INTERACT 2007, 11th IFIP TC 13 International Conference, Rio de Janeiro, Brazil, September 10-14, 2007, Proceedings, Part II, pp. 141-155, 2007, Springer, 978-3-540-74799-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, privacy, usability, Policy, policy-authoring |
80 | Maritza Johnson, John Karat, Clare-Marie Karat, Keith Grueneberg |
Optimizing a policy authoring framework for security and privacy policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, Redmond, Washington, USA, July 14-16, 2010, 2010, ACM, 978-1-4503-0264-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security policy, privacy policy, user experience design, policy management, policy refinement, policy authoring |
70 | Carolyn Brodie, David George, Clare-Marie Karat, John Karat, Jorge Lobo 0001, Mandis Beigi, Xiping Wang, Seraphin B. Calo, Dinesh C. Verma, Alberto E. Schaeffer Filho, Emil Lupu, Morris Sloman |
The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2-4 June 2008, Palisades, New York, USA, pp. 247-249, 2008, IEEE Computer Society, 978-0-7695-3133-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
policy deployment, portal, demonstration, policy analysis, policy verification, policy authoring |
54 | Kami Vaniea, Clare-Marie Karat, Joshua B. Gross, John Karat, Carolyn Brodie |
Evaluating assistance of natural language policy authoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008, Pittsburgh, Pennsylvania, USA, July 23-25, 2008, pp. 65-73, 2008, ACM, 978-1-60558-276-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
syntax highlighting, privacy, design process, privacy policies, natural language interfaces, social and legal issues |
37 | John Karat, Clare-Marie Karat, Carolyn Brodie, Jinjuan Feng |
Designing Natural Language and Structured Entry Methods for Privacy Policy Authoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTERACT ![In: Human-Computer Interaction - INTERACT 2005, IFIP TC13 International Conference, Rome, Italy, September 12-16, 2005, Proceedings, pp. 671-684, 2005, Springer, 3-540-28943-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Kathi Fisler, Shriram Krishnamurthi |
A model of triangulating environments for policy authoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings, pp. 3-12, 2010, ACM, 978-1-4503-0049-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
authoring environments, policy authoring |
30 | David Lewis 0001, Kevin Feeney, Kevin Foley, Linda Doyle, Timothy K. Forde, Patroklos G. Argyroudis, John Keeney, Declan O'Sullivan |
Managing Policies for Dynamic Spectrum Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autonomic Networking ![In: Autonomic Networking, First International IFIP TC6 Conference, AN 2006, Paris, France, September 27-29, 2006, Proceedings, pp. 285-297, 2006, Springer, 3-540-45891-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Steven Davy, Brendan Jennings, John Strassner |
The policy continuum-Policy authoring and conflict analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 31(13), pp. 2981-2995, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Clare-Marie Karat, John Karat, Carolyn Brodie, Jinjuan Feng |
Evaluating interfaces for privacy policy rule authoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2006 Conference on Human Factors in Computing Systems, CHI 2006, Montréal, Québec, Canada, April 22-27, 2006, pp. 83-92, 2006, ACM, 1-59593-372-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, design process, privacy policies, natural language interfaces, social and legal issues |
23 | Kevin Feeney, Karl Quinn, David Lewis 0001, Declan O'Sullivan, Vincent Wade |
Relationship-Driven Policy Engineering for Autonomic Organisations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 6-8 June 2005, Stockholm, Sweden, pp. 89-98, 2005, IEEE Computer Society, 0-7695-2265-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Mark Reith, Jianwei Niu 0001, William H. Winsborough |
Toward practical analysis for trust management policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 310-321, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
model checking, policy, trust management |
20 | Steven Davy, Brendan Jennings, John Strassner |
Application domain independent policy conflict analysis using information models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pp. 17-24, 2008, IEEE, 978-1-4244-2066-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Yurdaer N. Doganata, Keith Grueneberg, John Karat, Nirmal Mukhi |
Authoring and Deploying Business Policies Dynamically for Compliance Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011, pp. 161-164, 2011, IEEE Computer Society, 978-1-4244-9879-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
business provenance, business rules, compliance checking, Policy authoring |
17 | Stephanie Weinhardt, Doreen St. Pierre |
Lessons learned - Conducting a User Experience evaluation of a Trust Policy Authoring Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Open Identity Summit ![In: Open Identity Summit 2019, OID 2019, Garmisch-Partenkirchen, Germany, March 28-29, 2019, pp. 185-190, 2019, GI, 978-3-88579-687-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
17 | Stephanie Weinhardt, Olamide Omolola |
Usability of Policy Authoring Tools: A Layered Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019., pp. 301-308, 2019, SciTePress, 978-989-758-359-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Cristian Cleder Machado, Juliano Araujo Wickboldt, Lisandro Zambenedetti Granville, Alberto E. Schaeffer Filho |
Policy authoring for software-defined networking management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IM ![In: IFIP/IEEE International Symposium on Integrated Network Management, IM 2015, Ottawa, ON, Canada, 11-15 May, 2015, pp. 216-224, 2015, IEEE, 978-3-901882-76-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Mukta S. Aphale |
Intelligent agent support for policy authoring and refinement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2015 |
RDF |
|
17 | Thomas Trojer, Basel Katt, Thomas Schabetsberger, Richard Mair, Ruth Breu |
The Process of Policy Authoring of Patient-Controlled Privacy Preferences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eHealth ![In: Electronic Healthcare - 4th International Conference, eHealth 2011, Málaga, Spain, November 21-23, 2011, Revised Selected Papers, pp. 97-104, 2011, Springer, 978-3-642-29261-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Ryan Wishart, Domenico Corapi, Srdjan Marinovic, Morris Sloman |
Collaborative Privacy Policy Authoring in a Social Networking Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2010, IEEE International Symposium on Policies for Distributed Systems and Networks, Fairfax, VA, USA, 21-23 July 2010, pp. 1-8, 2010, IEEE Computer Society, 978-1-4244-8206-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, social networks, policy, collaborative authoring |
17 | Jason Barron, Steven Davy, Brendan Jennings, John Strassner |
A Policy Authoring Process and DEN-ng Model Extension for Federation Governance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MACE ![In: Modelling Autonomic Communication Environments - 5th IEEE International Workshop, MACE 2010, Niagara Falls, Canada, October 28, 2010. Proceedings, pp. 73-86, 2010, Springer, 978-3-642-16835-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Qun Ni, Elisa Bertino, Jorge Lobo 0001 |
D-algebra for composing access control policy decisions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 298-309, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
many-valued logic, MV-algebras, decision, policy composition |
13 | Peter F. Linington |
Policy Specification: Meeting Changing Requirements without Breaking the System Design Contract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC Workshops ![In: Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 16-20 October 2006, Hong Kong, China, Workshops, pp. 37, 2006, IEEE Computer Society, 0-7695-2743-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kelli Bacon, Keisha How, Heather Strong |
Expandable grids for visualizing and authoring computer security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2008 Conference on Human Factors in Computing Systems, CHI 2008, 2008, Florence, Italy, April 5-10, 2008, pp. 1473-1482, 2008, ACM, 978-1-60558-011-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
expandable grid, file permissions, security, visualization, privacy |
10 | Carolyn Brodie, Clare-Marie Karat, John Karat, Jinjuan Feng |
Usable security and privacy: a case study of developing privacy management tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 1st Symposium on Usable Privacy and Security, SOUPS 2005, Pittsburgh, Pennsylvania, USA, July 6-8, 2005, pp. 35-43, 2005, ACM, 1-59593-178-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, privacy, design, privacy policies, social and legal issues |
Displaying result #1 - #24 of 24 (100 per page; Change: )
|
|