Adam j. Lee [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Behind Enemy Lines: Exploring Trusted Data Stream Processing on Untrusted Systems CODASPY2019-2019 - Dallas, United States
Behind Enemy Lines: Exploring Trusted Data Stream Processing on Untrusted Systems CODASPY2019-2019 - Dallas, United States
On the Suitability of Dissemination-centric Access Control Systems for Group-centric Sharing CODASPY-2014 - San Antonio, USA
Application-Sensitive Access Control Evaluation using Parameterized Expressiveness CSF-2013 - Louisiana,USA
Access control for applications Third ACM Conference on Data and Application Security and Privacy-2013 - San Antonio,USA Security
Insured Access: An Approach to Ad-hoc Information Sharing for Virtual Organizations Third ACM Conference on Data and Application Security and Privacy-2013 - San Antonio,USA
Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice Symposium On Usable Privacy and Security-2012 - Washington
Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice SOUPS-2012 - Washington,USA