Publications

Protect mechanism, system privacy, vector illustration stock illustration...

2024

2023

2022

2021

2020

2019

2018

2017

2016

2015

2014

2012

2011

2010

  • Access control for home data sharing: Attitudes, needs and practices
    Michelle L. Mazurek, J.P. Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion, Christina Johns, Daniel Lee, Yuan Liang, Jenny Olsen, Brandon Salmon, Richard Shay, Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Gregory R. Ganger, Michael K. Reiter. In the Proceedings of CHI '10: Proceedings of the 28th international conference on Human factors in computing systems.
    ( CMU Tech Report)

2009

2008

2007

  • Lessons learned from the deployment of a smartphone-based access-control system.
    Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, and Kami Vaniea. In Symposium On Usable Privacy and Security, July 2007.
  • User-controllable security and privacy for pervasive computing.
    Jason Cornwell, Ian Fette, Gary Hsieh, Madhu Prabaker, Jinghai Rao, Karen Tang, Kami Vaniea, Lujo Bauer, Lorrie Cranor, Jason Hong, Bruce McLaren, Mike Reiter, and Norman Sadeh. In Eighth IEEE Workshop on Mobile Computing Systems and Applications (HotMobile), February 2007.
  • Comparing access-control technologies: a study of keys and smartphones
    Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, and Kami Vaniea. Technical Report CMU-CYLAB-07-005, CyLab, Carnegie Mellon University, February 2007.

Alternative Papers

Non-peer reviewed papers written by me that may need some explanation.

Acknowledgements

Interesting papers where I was involved in the research or development but not a full author

  • The Impact of Expressiveness on the Effectiveness of Privacy Mechanisms for Location Sharing
    Michael Benisch, Patrick Gage Kelley, Norman Sadeh, Tuomas Sandholm, Lorrie Faith Cranor, Paul Hankes Drielsma, and Janice Tsai
  • FoxTor
    Sasha Romanosky
    (Webpage)
  • Visual Analysis of Human Dynamics: An Introduction to the Special Issue.
    Yang Cai and Judith D. Terrill. In Information Visualization, 2006.
  • Understanding and Capturing People's Privacy Policies in a Mobile Social Networking Applications
    Norman Sadeh, Jason Hong, Lorrie Cranor, Ian Fette, Patrick Gage Kelley, Madhu Prabaker, Jinghai Rao
  • NetState : A Network Version Tracking System
    Nancy Durgin, Yuqing Mai, Jamie Van Randwyk. In USENIX, 2005.
  • Applying Collaborative Filtering for Efficient Document Search
    Seikyung Jung, Juntae Kim, Jonathan L Herlocker. In the Proceedings of the International Conference on Web Intelligence, 2004.
  • Using Educational Robotics to Engage Inner-Cit Students with Technology
    Rachel Goldman, Amy Eguchi and Elizabeth Sklar. In Proceedings of the Sixth International Conference of the Learning Sciences, 2004.
  • Learning While Teaching Robotics
    Elizabeth Sklar and Amy Eguchi. In AAAI Spring Symposium on Accessible Hands-on Artificial Intelligence and Robotics Education, 2004.