-
3
-
-
0034459145
-
The intellectual challenge of CSCW: The gap between social requirements and technical feasibility
-
M. S. Ackerman. The intellectual challenge of CSCW: The gap between social requirements and technical feasibility. Human-Computer Interaction, 15(2):179–203, 2000.
-
(2000)
Human-Computer Interaction
, vol.15
, Issue.2
, pp. 179-203
-
-
Ackerman, M.S.1
-
4
-
-
85080745890
-
Over-exposed? Privacy patterns and considerations in online and mobile photo sharing
-
S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman, and R. Nair. Over-exposed? Privacy patterns and considerations in online and mobile photo sharing. In Proc. ACM CHI, 2007.
-
(2007)
Proc. ACM CHI
-
-
Ahern, S.1
Eckles, D.2
Good, N.S.3
King, S.4
Naaman, M.5
Nair, R.6
-
6
-
-
85080801459
-
-
Apple. Apple iCloud. https://www.icloud.com/, 2013.
-
(2013)
Apple iCloud
-
-
-
8
-
-
84883056526
-
Retrospective privacy: Managing longitudinal privacy in online social networks
-
O. Ayalon and E. Toch. Retrospective privacy: Managing longitudinal privacy in online social networks. In Proc. SOUPS, 2013.
-
(2013)
Proc. SOUPS
-
-
Ayalon, O.1
Toch, E.2
-
10
-
-
57349096728
-
Efficient proving for practical distributed access-control systems
-
L. Bauer, S. Garriss, and M. K. Reiter. Efficient proving for practical distributed access-control systems. In ESORICS, 2007.
-
(2007)
ESORICS
-
-
Bauer, L.1
Garriss, S.2
Reiter, M.K.3
-
12
-
-
79957932922
-
Moving beyond untagging: Photo privacy in a tagged world
-
A. Besmer and H. Richter Lipford. Moving beyond untagging: Photo privacy in a tagged world. In Proc. ACM CHI, 2010.
-
(2010)
Proc. ACM CHI
-
-
Besmer, A.1
Lipford, H.R.2
-
13
-
-
42549104363
-
Yours, mine and ours? Sharing and use of technology in domestic environments
-
A. J. Brush and K. Inkpen. Yours, mine and ours? Sharing and use of technology in domestic environments. In Proc. UbiComp. 2007.
-
(2007)
Proc. UbiComp.
-
-
Brush, A.J.1
Inkpen, K.2
-
14
-
-
85040515478
-
Facebook & your privacy: Who sees the data you share on the biggest social network?
-
June
-
Facebook & your privacy: Who sees the data you share on the biggest social network? Consumer Reports Magazine, June 2012.
-
(2012)
Consumer Reports Magazine
-
-
-
15
-
-
85047120276
-
Google apologizes for Buzz privacy issues
-
Feb. 15
-
D. Coursey. Google apologizes for Buzz privacy issues. PCWorld. Feb. 15, 2010.
-
(2010)
PCWorld
-
-
Coursey, D.1
-
16
-
-
85080757397
-
Access control for sharing semantic data across desktops
-
J. L. De Coi, E. Ioannou, A. Koesling, W. Nejdl, and D. Olmedilla. Access control for sharing semantic data across desktops. In Proc. ISWC, 2007.
-
(2007)
Proc. ISWC
-
-
De Coi, J.L.1
Ioannou, E.2
Koesling, A.3
Nejdl, W.4
Olmedilla, D.5
-
19
-
-
0345578185
-
A semi-functional implementation of a higher-order logic programming language
-
Lee, editor, MIT Press
-
C. Elliott and F. Pfenning. A semi-functional implementation of a higher-order logic programming language. In P. Lee, editor, Topics in Advanced Language Implementation. MIT Press, 1991.
-
(1991)
Topics in Advanced Language Implementation
-
-
Elliott, C.1
Pfenning, F.2
-
24
-
-
85080636796
-
Teacher accidentally puts racy photo on students’ iPad
-
Forbes, October
-
K. Hill. Teacher accidentally puts racy photo on students’ iPad. School bizarrely suspends students. Forbes, October 2012.
-
(2012)
School Bizarrely Suspends Students
-
-
Hill, K.1
-
27
-
-
77954011711
-
Can I borrow your phone? Understanding concerns when sharing mobile phones
-
A. K. Karlson, A. J. B. Brush, and S. Schechter. Can I borrow your phone? Understanding concerns when sharing mobile phones. In Proc. ACM CHI, 2009.
-
(2009)
Proc. ACM CHI
-
-
Karlson, A.K.1
Brush, A.J.B.2
Schechter, S.3
-
28
-
-
85080747245
-
Tag, you can see it! Using tags for access control in photo sharing
-
P. Klemperer, Y. Liang, M. L. Mazurek, M. Sleeper, B. Ur, L. Bauer, L. F. Cranor, N. Gupta, and M. K. Reiter. Tag, you can see it! Using tags for access control in photo sharing. In Proc. ACM CHI, 2012.
-
(2012)
Proc. ACM CHI
-
-
Klemperer, P.1
Liang, Y.2
Mazurek, M.L.3
Sleeper, M.4
Ur, B.5
Bauer, L.6
Cranor, L.F.7
Gupta, N.8
Reiter, M.K.9
-
29
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst., 10(4):265–310, 1992.
-
(1992)
ACM Trans. Comput. Syst.
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
30
-
-
77952364800
-
Alpaca: Extensible authorization for distributed services
-
C. Lesniewski-Laas, B. Ford, J. Strauss, R. Morris, and M. F. Kaashoek. Alpaca: Extensible authorization for distributed services. In Proc. ACM CCS, 2007.
-
(2007)
Proc. ACM CCS
-
-
Lesniewski-Laas, C.1
Ford, B.2
Strauss, J.3
Morris, R.4
Kaashoek, M.F.5
-
32
-
-
70449397328
-
Ubiquitous systems and the family: Thoughts about the networked home
-
L. Little, E. Sillence, and P. Briggs. Ubiquitous systems and the family: Thoughts about the networked home. In Proc. SOUPS, 2009.
-
(2009)
Proc. SOUPS
-
-
Little, L.1
Sillence, E.2
Briggs, P.3
-
33
-
-
84877949595
-
Privacy settings in social networking systems: What you cannot control
-
A. Masoumzadeh and J. Joshi. Privacy settings in social networking systems: What you cannot control. In Proc. ACM ASIACCS, 2013.
-
(2013)
Proc. ACM ASIACCS
-
-
Masoumzadeh, A.1
Joshi, J.2
-
34
-
-
84866760170
-
Access control for home data sharing: Attitudes, needs and practices
-
M. L. Mazurek, J. P. Arsenault, J. Bresee, N. Gupta, I. Ion, C. Johns, D. Lee, Y. Liang, J. Olsen, B. Salmon, R. Shay, K. Vaniea, L. Bauer, L. F. Cranor, G. R. Ganger, and M. K. Reiter. Access control for home data sharing: Attitudes, needs and practices. In Proc. ACM CHI, 2010.
-
(2010)
Proc. ACM CHI
-
-
Mazurek, M.L.1
Arsenault, J.P.2
Bresee, J.3
Gupta, N.4
Ion, I.5
Johns, C.6
Lee, D.7
Liang, Y.8
Olsen, J.9
Salmon, B.10
Shay, R.11
Vaniea, K.12
Bauer, L.13
Cranor, L.F.14
Ganger, G.R.15
Reiter, M.K.16
-
35
-
-
84862081868
-
Exploring reactive access control
-
M. L. Mazurek, P. F. Klemperer, R. Shay, H. Takabi, L. Bauer, and L. F. Cranor. Exploring reactive access control. In Proc. ACM CHI, 2011.
-
(2011)
Proc. ACM CHI
-
-
Mazurek, M.L.1
Klemperer, P.F.2
Shay, R.3
Takabi, H.4
Bauer, L.5
Cranor, L.F.6
-
37
-
-
85080647621
-
-
Microsoft. Windows SkyDrive. http://windows.microsoft.com/en-us/skydrive/, 2013.
-
(2013)
Windows SkyDrive
-
-
-
41
-
-
84874802830
-
Ensemblue: Integrating distributed storage and consumer electronics
-
D. Peek and J. Flinn. EnsemBlue: Integrating distributed storage and consumer electronics. In Proc. OSDI, 2006.
-
(2006)
Proc. OSDI
-
-
Peek, D.1
Flinn, J.2
-
42
-
-
82155188100
-
PodBase: Transparent storage management for personal devices
-
A. Post, P. Kuznetsov, and P. Druschel. PodBase: Transparent storage management for personal devices. In Proc. IPTPS, 2008.
-
(2008)
Proc. IPTPS
-
-
Post, A.1
Kuznetsov, P.2
Druschel, P.3
-
43
-
-
85076887479
-
CIMBIoSys: A platform for content-based partial replication
-
V. Ramasubramanian, T. L. Rodeheffer, D. B. Terry, M. Walraed-Sullivan, T. Wobber, C. C. Marshall, and A. Vahdat. Cimbiosys: A platform for content-based partial replication. In Proc. NSDI, 2009.
-
(2009)
Proc. NSDI
-
-
Ramasubramanian, V.1
Rodeheffer, T.L.2
Terry, D.B.3
Walraed-Sullivan, M.4
Wobber, T.5
Marshall, C.C.6
Vahdat, A.7
-
44
-
-
34547169479
-
A grounded theory of information sharing behavior in a personal learning space
-
M. N. Razavi and L. Iverson. A grounded theory of information sharing behavior in a personal learning space. In Proc. ACM CSCW, 2006.
-
(2006)
Proc. ACM CSCW
-
-
Razavi, M.N.1
Iverson, L.2
-
45
-
-
84971485032
-
Expandable grids for visualizing and authoring computer security policies
-
R. W. Reeder, L. Bauer, L. Cranor, M. K. Reiter, K. Bacon, K. How, and H. Strong. Expandable grids for visualizing and authoring computer security policies. In Proc. ACM CHI, 2008.
-
(2008)
Proc. ACM CHI
-
-
Reeder, R.W.1
Bauer, L.2
Cranor, L.3
Reiter, M.K.4
Bacon, K.5
How, K.6
Strong, H.7
-
46
-
-
82155203106
-
Policy expressivity in the Anzere personal cloud
-
O. Riva, Q. Yin, D. Juric, E. Ucan, and T. Roscoe. Policy expressivity in the Anzere personal cloud. In Proc. ACM SOCC, 2011.
-
(2011)
Proc. ACM SOCC
-
-
Riva, O.1
Yin, Q.2
Juric, D.3
Ucan, E.4
Roscoe, T.5
-
52
-
-
84858839681
-
Eyo: Device-transparent personal storage
-
J. Strauss, J. M. Paluska, C. Lesniewski-Laas, B. Ford, R. Morris, and F. Kaashoek. Eyo: device-transparent personal storage. In Proc. USENIX-ATC, 2011.
-
(2011)
Proc. USENIX-ATC
-
-
Strauss, J.1
Paluska, J.M.2
Lesniewski-Laas, C.3
Ford, B.4
Morris, R.5
Kaashoek, F.6
-
53
-
-
84878864910
-
Silent listeners: The evolution of privacy and disclosure on facebook
-
F. Stutzman, R. Gross, and A. Acquisti. Silent listeners: The evolution of privacy and disclosure on facebook. Journal of Privacy and Confidentiality, 4(2):2, 2013.
-
(2013)
Journal of Privacy and Confidentiality
, vol.4
, Issue.2
, pp. 2
-
-
Stutzman, F.1
Gross, R.2
Acquisti, A.3
-
54
-
-
84868245647
-
Out of sight, out of mind: Effects of displaying access-control information near the item it controls
-
K. Vaniea, L. Bauer, L. F. Cranor, and M. K. Reiter. Out of sight, out of mind: Effects of displaying access-control information near the item it controls. In Proc. IEEE PST, 2012.
-
(2012)
Proc. IEEE PST
-
-
Vaniea, K.1
Bauer, L.2
Cranor, L.F.3
Reiter, M.K.4
-
56
-
-
85080781562
-
McAfee’s rookie mistake gives away his location
-
December
-
B. Weitzenkorn. McAfee’s rookie mistake gives away his location. Scientific American, December 2012.
-
(2012)
Scientific American
-
-
Weitzenkorn, B.1
-
57
-
-
73849097622
-
Easy on that trigger dad: A study of long term family photo retrieval
-
S. Whittaker, O. Bergman, and P. Clough. Easy on that trigger dad: a study of long term family photo retrieval. Personal and Ubiquitous Computing, 14(1):31–43, 2010.
-
(2010)
Personal and Ubiquitous Computing
, vol.14
, Issue.1
, pp. 31-43
-
-
Whittaker, S.1
Bergman, O.2
Clough, P.3
-
58
-
-
85080721051
-
Fighting for my space: Coping mechanisms for SNS boundary regulation
-
P. J. Wisniewski, H. Richter Lipford, and D. C. Wilson. Fighting for my space: Coping mechanisms for SNS boundary regulation. In Proc. ACM CHI, 2012.
-
(2012)
Proc. ACM CHI
-
-
Wisniewski, P.J.1
Lipford, H.R.2
Wilson, D.C.3
-
60
-
-
77954593401
-
Policy-based access control for weakly consistent replication
-
T. Wobber, T. L. Rodeheffer, and D. B. Terry. Policy-based access control for weakly consistent replication. In Proc. Eurosys, 2010.
-
(2010)
Proc. Eurosys
-
-
Wobber, T.1
Rodeheffer, T.L.2
Terry, D.B.3
-
61
-
-
85080635840
-
Income, race, and class: Exploring socioeconomic differences in family technology use
-
S. Yardi and A. Bruckman. Income, race, and class: Exploring socioeconomic differences in family technology use. In Proc. ACM CHI, 2012.
-
(2012)
Proc. ACM CHI
-
-
Yardi, S.1
Bruckman, A.2
-
62
-
-
41849090098
-
Accessible design and testing in the application development process: Considerations for an integrated approach
-
G. Zimmermann and G. Vanderheiden. Accessible design and testing in the application development process: Considerations for an integrated approach. Universal Access in the Information Society, 7(1-2):117–128, 2008.
-
(2008)
Universal Access in the Information Society
, vol.7
, Issue.1-2
, pp. 117-128
-
-
Zimmermann, G.1
Vanderheiden, G.2
|