Notice: This material is
presented to ensure timely dissemination of scholarly and technical
work. Copyright and all rights therein are retained by authors or by
other copyright holders. All persons copying this information are
expected to adhere to the terms and constraints invoked by each
author's copyright. In most cases, these works may not be reposted
without the explicit permission of the copyright holder.
A relatively complete list of publications can also be found at DBLP.
Refereed Journal Articles
[J09] |
Stefano Berlato, Roberto Carbone, Adam J. Lee, Silvio Ranise: Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud. 2:1-2:37 [Link]
|
[J08] |
Jacob T. Biehl and Adam J. Lee, "Anchor of Trust: Towards Collusion-Resistant Trusted Indoor Location for Enterprise and Industrial Use," Personal and Ubiquitous Computing, 24, 551-569 (2020) [Link]
|
[J07] |
Marian K. Iskander, Dave Wilkinson, Tucker Trainor, Adam J. Lee, and Panos Chrysanthis,
"Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions,"
IEEE Transactions on Parallel and Distributed Systems 25(2), February 2014 [PDF]
|
[J06] |
Eleanor G. Rieffel, Jacob Biehl, Adam J. Lee, and William van Melle,
"Private Aggregation for Presence Streams," Future Generation Computer Systems,
31, February 2014 [Link]
|
[J05] |
Jacob T. Biehl, Eleanor Rieffel, and Adam J. Lee, "When Privacy
and Utility are in Harmony: Towards Better Design of Presence
Technologies," Personal
and Ubiquitous Computing, 17(3), March 2013. [PDF]
|
[J04] |
Mehmud Abliz, Taieb Znati, and Adam J. Lee, "Mitigating Distributed Service Flooding Attacks with Guided Tour Puzzles," International Journal on Advances in Security, 5(3 & 4), December 2012. [PDF]
|
[J03] |
Adam J. Lee, Kazuhiro Minami, and Marianne Winslett, "On the
Consistency of Distributed Proofs with Hidden Subtrees,"
ACM Transactions on Information and System Security 13(3),
July 2010. [PDF]
Note: This paper supersedes [C08], below. |
[J02] |
Adam J. Lee and Marianne Winslett, "Enforcing Safety and
Consistency Constraints in Policy-Based Authorization Systems,"
ACM Transactions on Information and System Security
12(2), December 2008. [PDF]
Note: This paper supersedes [C07], below. |
[J01] |
Adam J. Lee, Marianne Winslett, Jim Basney, and Von Welch, "The
Traust Authorization Service," ACM Transactions on Information
and System Security 11(1):1-33, February 2008. [PDF] Note: This paper supersedes [C05], below. |
Magazine Articles and Book Chapters
[MB04] |
Adam J. Lee, "Credential-Based Access Control," Encyclopedia of
Cryptography and Security (2nd Ed.), pages 271-272,
2011. [Link] |
[MB03] |
Brian Wongchaowart and Adam J. Lee, "Trust
Management," Encyclopedia of Cryptography and Security (2nd
Ed.), pages 1320-1323, 2011. [Link] |
[MB02] |
Adam J. Lee and Ting Yu, "Report on the Sixth ACM Workshop on
Privacy in the Electronic Society (WPES 2007)," SIGMOD
Record 37(1):56-58, March 2008. [PDF] |
[MB01] |
Adam J. Lee, Kent E. Seamons, Marianne Winslett, and Ting Yu,
"Automated Trust Negotiation in Open Systems," in Secure Data
Management in Decentralized Systems, Ting Yu and Sushil
Jajodia (Editors), Springer, Berlin, 2007. [Link] |
Refereed Conference Papers
[C53] | Pranut Jain, Rosta Farzan, and Adam J. Lee, "Laila is in a Meeting: Design and Evaluation of a Contextual Auto-Response Messaging Agent," The ACM SIGCHI Conference on Designing Interactive Systems (DIS), June 2022. [PDF] |
[C52] | Pranut Jain, Rosta Farzan, and Adam J. Lee, "Context-based Automated Responses of Unavailability in Mobile Messaging," The European Conference on Computer-Supported Cooperative Work (ECSCW), May 2021. [Link] |
[C51] | Imtiaz Ahmad, Rosta Farzan, Apu Kapadia, and Adam J. Lee, "Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy," The 23rd ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW), November 2020. [PDF] |
[C50] | Stefano Berlato, Roberto Carbone, Adam J. Lee, and Silvio Ranise, "Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization," 15th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2020) , October 2020. [PDF] |
[C49] | Marian Zaki, Adam J. Lee, and Panos K. Chrysanthis, "Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems," 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), July 2020. [PDF] |
[C48] | Cory Thoma, Adam J. Lee, and Alexandros Labrinidis, "Shoal: Query Optimization and Operator Placement for Access Controlled Stream Processing Systems," 33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), July 2019. [PDF] |
[C47] | Judicael-Briand Djoko-Takougue, John R. Lange, Adam J. Lee, "NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-side SGX," Proceedings of the 49th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2019. [PDF] |
[C46] | Pranut Jain, Rosta Farzan, Adam J. Lee, "Adaptive Modelling of Attentiveness to Messaging: a Hybrid Approach," Proceedings of the 27th ACM Conference On User Modelling, Adaptation And Personalization (UMAP), June 2019. [PDF] |
[C45] | Ekaterina B. Dimitrova, Panos K. Chrysanthis, Adam J. Lee, "Authorization-Aware Optimization for Multi-Provider Queries," Proceedings of the 34th ACM/SIGAPP Symposium On Applied Computing: Special Track on Databases and Big Data Management (ACM SAC), April 2019. [PDF] |
[C44] | Cory Thoma, Adam J. Lee, Alexandros Labrinidis, "Behind Enemy Lines: Exploring Trusted Data Stream Processing on Untrusted Systems," Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), March 2019. [PDF] |
[C43] | Adam J. Lee, Jacob T. Biehl, Conor Curry. "Sensing or Watching?: Balancing Utility and Privacy in Sensing Systems via Collection and Enforcement Mechanisms," Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT), June 2018. [PDF] |
[C42] | Lauren Thomson, Adam J. Lee, Rosta Farzan, "Ephemeral Communication and Communication Places - What Influences College-Aged Negotiation of Instant Messaging Usage Within App Ecosystems?," in iConference 2018, March 2018. [PDF] |
[C41] | Roberto Hoyle, Srijita Das, Apu Kapadia, Adam J. Lee, and Kami Vaniea,
"Was my message read?: Privacy and Signaling on Facebook Messenger," in Proceedings of the The ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2017),
May 2017. [PDF] |
[C40] | Roberto Hoyle, Srijita Das, Apu Kapadia, Adam J. Lee, and Kami Vaniea,
"Viewing the Viewers: Publishers' Desires and Viewers' Privacy Concerns in Social Networks," in Proceedings of the 20th
ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2017),
February 2017. [PDF] |
[C39] | Cory Thoma, Adam J. Lee, and Alexandros Labrinidis,
"PolyStream: Cryptographically Enforced Access Controls for Outsourced Data Stream Processing," in Proceedings of the 21st
ACM Symposium on Access Control Models and Technologies (SACMAT 2016),
June 2016. [PDF] |
[C38] | William C. Garrison III, Adam Shull, Adam J. Lee, and
Steven Myers, "On the Practicality of Cryptographically Enforcing
Dynamic Access Control Policies in the Cloud," in Proceedings of
the 37th IEEE Symposium on Security and Privacy
(Oakland 2016), May 2016. [PDF] Note: An extended version of this paper can be found at arXiv.org. |
[C37] | Judicael B. Djoko, Brandon Jennings, and Adam J. Lee,
"TPRIVEXEC: Private Execution In Virtual Memory," in Proceedings of the 6th
ACM Conference on Data and Application Security and Privacy (CODASPY 2016),
March 2016. [PDF] |
[C36] | Jacob T. Biehl, Adam J. Lee, Gerry Filby, and Matthew Cooper,
"You're Where? Prove it! Towards Trusted Indoor Location Estimation of Mobile Devices," in Proceedings of the
ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2015),
September 2015. [PDF] |
[C35] | William C. Garrison III and Adam J. Lee,
"Decomposing, Comparing, and Synthesizing Access Control Expressiveness Simulations," in Proceedings of the
28th IEEE Computer Security Foundations Symposium (CSF),
July 2015. [PDF] Note: An extended version of this paper can be found at arXiv.org. |
[C34] | Sameer Patil, Roberto Hoyle, Roman Schlegel, Apu Kapadia, and Adam J. Lee,
"Interrupt Now or Inform Later?: Comparing Immediate and Delayed Privacy Feedback," in Proceedings of the
International Conference on Human Factors in Computing Systems (CHI),
April 2015. [PDF] |
[C33] | William C. Garrison III, Adam J. Lee, and Timothy L. Hinrichs,
"An Actor-Based, Application-Aware Access Control Evaluation Framework," in Proceedings of the
The 19th ACM Symposium on Access Control Models and Technologies (SACMAT),
June 2014. [PDF] |
[C32] | Sameer Patil, Roman Schlegel, Apu Kapadia, and Adam J. Lee,
"Reflection or Action?: How Feedback and Control Affect Location Sharing Decisions," in Proceedings of the
The International Conference on Human Factors in Computing Systems (CHI),
April 2014. [PDF] |
[C31] | William C. Garrison III, Yechen Qiao, and Adam J. Lee,
"On the Suitability of Dissemination-centric Access Control Systems for Group-centric Sharing," in Proceedings of the
Fourth ACM Conference on Data and Application Security and Privacy (CODASPY),
March 2014. [PDF] Note: Proofs of all theorems in this paper can be found here. Note: Outstanding Paper Award winner at CODASPY 2014. |
[C30] | Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, and Ting Yu,
"PAQO: Preference-Aware Query Optimization for Decentralized Database Systems," in Proceedings of the
30th IEEE International Conference on Data Engineering (ICDE),
April 2014. [PDF] |
[C29] | Timothy Hinrichs, Diego Martinoia, William C. Garrison III, Adam J. Lee, Alessandro Panebianco and Lenore Zuck,
"Application-Sensitive Access Control Evaluation using Parameterized Expressiveness," in Proceedings of the
26th IEEE Computer Security Foundations Symposium (CSF),
June 2013. [PDF] |
[C28] | Andrew K. Adams and Adam J. Lee,
"Combining Social Authentication and Untrusted Clouds for Private Location Sharing," in Proceedings of the
18th ACM Symposium on Access Control Models and Technologies
(SACMAT),
June 2013. [PDF] |
[C27] | Naoki Tanaka, Marianne Winslett, Adam J. Lee, David K.Y. Yau, and Feng Bao,
"Insured Access: An Approach to Ad-hoc Information Sharing for
Virtual Organizations," in Proceedings of the
Third ACM Conference on Data and Application Security and Privacy
(CODASPY),
February 2013. [PDF] |
[C26] | Marian K. Iskander, Adam J. Lee, and Daniel Mosse',
"Confidentiality-Preserving and Fault-Tolerant In-Network
Aggregation for Collaborative WSNs," in Proceedings of the 8th
IEEE International Conference on Collaborative Computing:
Networking, Applications and Worksharing (CollaborateCom),
October 2012. [PDF] |
[C25] | Sandro Etalle, Timothy L. Hinrichs, Adam J. Lee,
Daniel Trivellato, and Nicola Zannone, "Policy Administration in
Tag-Based Authorization," in Proceedings of the Fifth
International Symposium on Foundations & Practice of Security
(FPS), October 2012. [PDF] |
[C24] | Sameer Patil, Greg Norcie, Apu Kapadia, and Adam J. Lee,
"Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing
as an Interactive Practice," in Proceedings of the Eighth Symposium on
Usable Privacy and Security (SOUPS), July 2012. [PDF] |
[C23] | Yann Le Gall, Adam J. Lee, and Apu Kapadia, "PlexC: A
Policy Language for Exposure Control," in Proceedings of the 17th
ACM Symposium on Access Control Models and Technologies
(SACMAT), June 2012. [PDF] |
[C22] | Xi Gong, Ting Yu, and Adam J. Lee, "Bounding Trust in Reputation Systems with Incomplete Information," in Proceedings of the
Second ACM Conference on Data and Application Security and Privacy
(CODASPY), February 2012. [PDF] |
[C21] |
Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, and Ting
Yu, "Don't Reveal My Intension: Protecting User Privacy using
Declarative Preferences during Distributed Query Processing,"
in Proceedings of the 16th European Symposium on Research in
Computer Security (ESORICS), September 2011. [PDF] Note: Extended version available as [NR06], below. |
[C20] |
Roman Schlegel, Apu Kapadia, and Adam J. Lee, "Eyeing your
Exposure: Quantifying and Controlling Information Sharing for
Improved Privacy," in Proceedings of the Seventh Symposium on
Usable Privacy and Security (SOUPS), July 2011. [PDF] |
[C19] |
Eleanor Rieffel, Jacob Biehl, Bill van Melle, and Adam J. Lee,
"Secured Histories for Presence Systems," in Proceedings of the
International Symposium on Security in Collaboration Technologies
and Systems (SECOTS), May
2011. [PDF]
Note: This paper was a CTS 2011 Outstanding Paper nominee. |
[C18] |
Kazuhiro Minami, Nikita Borisov, Marianne Winslett, and Adam
J. Lee, "Confidentiality-Preserving Proof Theories for Distributed
Proof Systems," in Proceedings of the Sixth ACM Symposium on
Information, Computer, and Communication Security (ASIACCS
2011), March
2011. [PDF] |
[C17] |
Andrew K. Adams, Adam J. Lee, and Daniel Mossé,
"Receipt-Mode Trust Negotiation: Efficient Authorization Through
Outsourced Interactions," in Proceedings of the Sixth ACM
Symposium on Information, Computer, and Communication Security
(ASIACCS 2011), March
2011. [PDF] |
[C16] |
Adam J. Lee and Ting Yu, "Towards Quantitative Analysis of Proofs of
Authorization: Applications, Framework, and Techniques,"
in Proceedings of the 23rd IEEE Computer Security Foundations
Symposium (CSF 2010), July 2010. [PDF] |
[C15] |
Brian Wongchaowart and Adam J. Lee, "Oblivious Enforcement of
Hidden Information Release Policies,"
in Proceedings of the Fifth ACM Symposium on Information,
Computer, and Communication Security (ASIACCS 2010), April
2010. [PDF] |
[C14] |
Adam J. Lee, Ting Yu, and Yann Le Gall, "Effective Trust
Management Through a Hybrid Logical and Relational Approach,"
in Proceedings of the Fifth ACM Symposium on Information,
Computer, and Communication Security (ASIACCS 2010), April
2010. [PDF] |
[C13] |
Adam J. Lee and Ting Yu,
"Towards a Dynamic and Composite Model of Trust,"
in Proceedings of the 14th ACM Symposium on Access Control
Models and Technologies (SACMAT), June 2009. [PDF] |
[C12] |
Adam J. Lee, Marianne Winslett, and Kenneth J. Perano,
"TrustBuilder2: A Reconfigurable Framework for Trust Negotiation,"
in Proceedings of the Third IFIP WG 11.11 International
Conference on Trust Management (IFIPTM 2009), June 2009. [PDF] |
[C11] |
Adam J. Lee, Kazuhiro Minami, and Nikita
Borisov, "Confidentiality-Preserving Distributed Proofs of
Conjunctive Queries," in Proceedings of the Fourth ACM Symposium
on Information, Computer, and Communication Security (ASIACCS
2009), March 2009.
[PDF] Note: Extended version available as [NR05], below. |
[C10] |
Adam J. Lee and Marianne Winslett, "Towards Standards-Compliant
Trust Negotiation for Web Services," in Proceedings of the
Joint iTrust and PST Conferences on Privacy, Trust Management, and
Security (IFIPTM 2008), June 2008.
[PDF] Note: Extended version available as [NR04], below. |
[C09] |
Adam J. Lee and Marianne Winslett, "Towards an Efficient and
Language-Agnostic Compliance Checker for Trust Negotiation
Systems," in Proceedings of the 3rd ACM Symposium on
Information, Computer and Communications Security (ASIACCS
2008), March 2008. [PDF] Note: Extended version available as [NR03], below. |
[C08] |
Adam J. Lee, Kazuhiro Minami, and Marianne Winslett, "Lightweight
Consistency Enforcement Schemes for Distributed Proofs with Hidden
Subtrees," in Proceedings of the 12th ACM Symposium on Access
Control Models and Technologies (SACMAT 2007), June 2007. [PDF]
Note: Superseded by [J03], above. |
[C07] |
Adam J. Lee and Marianne Winslett, "Safety and Consistency in
Policy-Based Authorization Systems," The 13th ACM Conference on
Computer and Communications Security (CCS 2006),
October/November 2006. [PDF]
Note: Superseded by [J02], above. |
[C06] |
Mehran Ahsant, Jim Basney, Olle Mulmo, Adam J. Lee, and Lennart
Johnsson, "Toward an On-Demand Restricted Delegation Mechanism for
Grids," The 7th IEEE/ACM International Conference on Grid
Computing (Grid 2006), September 2006. [PDF] |
[C05] |
Adam J. Lee, Marianne Winslett, Jim Basney, and Von Welch,
"Traust: A Trust Negotiation-Based Authorization Service for Open
Systems," The Eleventh ACM Symposium on Access Control Models
and Technologies (SACMAT 2006), June
2006. [PDF] Note: Superseded by [J01], above. |
[C04] |
Adam J. Lee and Marianne Winslett, "Virtual Fingerprinting as a
Foundation for Reputation in Open Systems," The Fourth
International Conference on Trust Management (iTrust 2006),
May 2006. [PDF] Note: Extended version available as [NR02], below. |
[C03] |
Adam J. Lee, Gregory A. Koenig, and William Yurcik, "Cluster
Security with NVisionCC: The Forseti Distributed File Integrity
Checker," The Los Alamos Computer Science Institute Symposium
(LACSI 2005), October 2005. [PDF] |
[C02] |
Suvda Myagmar, Adam J. Lee, and William Yurcik, "Threat
Modeling as a Basis for Security Requirements," IEEE Symposium
on Requirements Engineering for Information Security (SREIS),
August 2005. [PDF] |
[C01] |
Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Prasad Naldurg,
Raquel L. Hill, and Roy H. Campbell, "Supporting Dynamically
Changing Authorizations in Pervasive Communication Systems,"
Second International Conference on Security in Pervasive
Computing, April 2005. [PDF] |
Refereed Workshop Papers
[W16] | Jacob T. Biehl, Ravi Patel, and Adam J. Lee, "Improving Medication Adherence Behaviors Through Personalized, Technology-Powered Interventions," in IUI Heathy Interfaces Workshop (HEALTHI), April 2021. [Link] |
[W15] | Apu Kapadia and Adam J. Lee, "Improving Privacy
through Exposure Awareness and Reactive Mechanisms," in CHI 2016
Workshop on Bridging the Gap between Privacy by Design and Privacy
in Practice, May 2016. [PDF] |
[W14] | Cory Thoma, Alexandros Labrinidis, and Adam J. Lee,
"Automated Operator Placement in Dis- tributed Data Stream
Management Systems Subject to User Constraints," in Proceedings
of the 9th International Workshop on Self-Managing Database Systems
(SMDB), April 2014. [PDF] |
[W13] | William C. Garrison III, Adam J. Lee, and Timothy
L. Hinrichs, "The Need for Application-Aware Access Control
Evaluation," in Proceedings of the New Security Paradigms
Workshop (NSPW), September 2012. [PDF] |
[W12] | Sameer
Patil, Yann Le Gall, Adam J. Lee, and Apu Kapadia, "My Privacy
Policy: Exploring End-user Specification of Freeform Location Access
Rules," in Proceedings of the 2012 Workshop on Usable Security
(USEC), February 2012. [PDF] |
[W11] | Timothy L. Hinrichs, William C. Garrison III, Adam
J. Lee, Skip Saunders, and John C. Mitchell, "TBA: A Hybrid of Logic
and Extensional Access Control Systems," in Proceedings of the
8th International Workshop on Formal Aspects of Security & Trust
(FAST), September 2011. [PDF] Note: Extended version available as [NR07], below. |
[W10] |
Marian K. Iskander, Dave W. Wilkinson, Adam J. Lee, and Panos
K. Chrysanthis, "Enforcing Policy and Data Consistency of Cloud
Transactions," in Proceedings of the Second International
Workshop on Security and Privacy in Cloud Computing
(ICDCS-SPCC), June
2011. [PDF] |
[W09] |
Nicholas Farnan, Adam J. Lee, and Ting Yu, "Investigating
Privacy-Aware Distributed Query Evaluation," in Proceedings of
the Ninth ACM Workshop on Privacy in the Electronic Society (WPES
2010), October 2010. [PDF] |
[W08] |
Kazuhiro Minami, Adam J. Lee, Marianne Winslett, and Nikita
Borisov, "Secure Aggregation in a Publish-Subscribe System,"
in Proceedings of the Seventh ACM Workshop on Privacy in the
Electronic Society (WPES 2008), October
2008. [PDF] |
[W07] |
Adam J. Lee, Jodie P. Boyer, Lars E. Olson, and Carl A. Gunter,
"Defeasible Security Policy Composition for Web Services," The
4th ACM Workshop on Formal Methods in Security Engineering (FMSE
2006) held in conjunction with The 13th ACM Conference on
Computer and Communications Security (CCS 2006), November
2006. [PDF] |
[W06] |
Adam J. Lee, Parisa Tabriz, and Nikita Borisov, "A
Privacy-Preserving Interdomain Audit Framework," The 5th ACM
Workshop on Privacy in the Electronic Society (WPES 2006) held
in conjunction with The 13th ACM Conference on Computer and
Communications Security (CCS 2006), October 2006.
[PDF] |
[W05] |
Adam J. Lee and Marianne Winslett, "Open Problems for Usable and
Secure Open Systems," Usability Research Challenges for
Cyberinfrastructure and Tools held in conjunction with ACM
CHI 2006, April 2006. [PDF] |
[W04] |
Ragib Hasan, Suvda Myagmar, Adam J. Lee, and William Yurcik,
"Toward a Threat Model for Storage Systems," International
Workshop on Storage Security and Survivability (StorageSS) in
conjunction with 12th ACM Conference on Computer and
Communications Security (CCS 2005) , November 11,
2005. [PDF] |
[W03] |
Adam J. Lee, Gregory A. Koenig, Xin Meng, and William Yurcik,
"Searching for Open Windows and Unlocked Doors: Port Scanning in
Large-Scale Commodity Clusters," The First International
Workshop on Cluster Security held in conjunction with the
Fifth IEEE/ACM International Symposium on Cluster Computing and
the Grid (CCGrid), May 2005. [PDF] |
[W02] |
Gregory A. Koenig, Xin Meng, Adam J. Lee, Michael Treaster,
Nadir Kiyanclar, and William Yurcik, "Cluster Security with
NVisionCC: Process Monitoring by Leveraging Emergent Properties,"
The First International Workshop on Cluster Security held
in conjunction with the Fifth IEEE/ACM International Symposium
on Cluster Computing and the Grid (CCGrid), May 2005. [PDF] |
[W01] |
Kiran Lakkaraju, William Yurcik, Adam J. Lee, Ratna Bearavolu,
Yifan Li, and Xiaoxin Yin, " NVisionIP: NetFlow Visualizations of
System State for Security Situational Awareness ," CCS Workshop
on Visualization and Data Mining for Computer Security
(VizSEC/DMSEC), October 2004. [PDF] |
Refereed Work-in-Progress, Demo, and Poster Abstracts
[WDP07] | Pranut Jain, Rosta Farzan, Adam J. Lee, "Are You There? Identifying Unavailability in Mobile Messaging," Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (CHI, Late-Breaking Work), May 2019.
[PDF] |
[WDP06] |
Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, and Ting Yu,
"PAQO: A Preference-Aware Query Optimizer for PostgreSQL,"
The 39th International Conference on Very Large Databases (VLDB), August 2013. [PDF] |
[WDP05] |
Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, and Ting Yu,
"Enabling Intensional Access Control via Preference-Aware Query Optimization,"
The ACM Symposium on Access Control Models and Technologies (SACMAT), June 2013. [PDF] |
[WDP04] |
Sameer Patil, Greg Norcie, Apu Kapadia, and Adam J. Lee,
"Check out where I am!: Location-Sharing Motivations, Preferences, and Practices,"
The ACM SIGCHI Conference on Human Factors in Computing Systems, Extended Abstracts (CHI-EA), May 2012. [PDF] |
[WDP03] |
Xi Gong, Ting Yu, and Adam J. Lee,
"Poster: On Trust Evaluation with Missing Information in Reputation Systems,"
The ACM Conference on Computer and Communications Security (CCS), October 2011. [PDF] |
[WDP02] |
Marian Kamal Iskander, Adam J. Lee, and Daniel Mosse',
"Privacy and Robustness for Data Aggregation in Wireless Sensor Networks,"
The ACM Conference on Computer and Communications Security (CCS), October 2010. [PDF] |
[WDP01] |
Adam J. Lee, Marianne Winslett, Jim Basney, and Von Welch,
"Traust: A Trust Negotiation Based Authorization Service,"
Demonstration Short Paper, The Fourth International Conference
on Trust Management (iTrust 2006), May 2006. [PDF] |
Theses
[T02] |
Adam J. Lee. "Towards Practical and Secure Decentralized
Attribute-Based Authorization Systems," Ph.D. Dissertation,
University of Illinois at Urbana-Champaign Department of Computer
Science Technical Report No. UIUCDCS-R-2008-2985, July 2008. [PDF] |
[T01] | Adam J. Lee. "Traust: A Trust Negotiation Based Authorization Service for Open Systems." Master's Thesis, University of Illinois at Urbana-Champaign, August 2005. |
Other Non-Refereed Publications
[NR08] | William C. Garrison III, Adam J. Lee, and Timothy L. Hinrichs,
"The Design and Demonstration of an Actor-Based, Application-Aware Access Control Evaluation Framework,"
Technical Report arXiv:1302.1134,
February 2013. [PDF] |
[NR07] | Timothy L. Hinrichs, William C. Garrison III, Adam J. Lee, Skip Saunders, and John C. Mitchell,
"TBA: A Hybrid of Logic and Extensional Access Control Systems (Extended Version),"
University of Pittsburgh Department of
Computer Science Technical Report No. TR-11-182,
October 2011. [PDF] Note: This is an extended version of [W11]. |
[NR06] | Nicholas L. Farnan, Adam J. Lee, Panos
K. Chrysanthis, and Ting Yu, "Don't Reveal My Intension:
Protecting User Privacy using Declarative Preferences during
Distributed Query Processing (Extended Version),"
University of Pittsburgh Department of
Computer Science Technical Report No. TR-11-179,
October 2011. [PDF] Note: This is an extended version of [C21]. |
[NR05] | Adam J. Lee, Kazuhiro Minami, and Nikita Borisov ,
"Confidentiality-Preserving Distributed Proofs of Conjunctive Queries (Extended Version),"
University of Pittsburgh Department of
Computer Science Technical Report No. TR-08-161,
December 2008. [PDF] Note: This is an extended version of [C11]. |
[NR04] | Adam J. Lee and Marianne Winslett, "Towards
Standards-Compliant Trust Negotiation for Web Services (Extended Version),"
University of Illinois at Urbana-Champaign Department of
Computer Science Technical Report No. UIUCDCS-R-2008-2944,
March 2008. [PDF] Note: This is an extended version of [C10]. |
[NR03] | Adam J. Lee and Marianne Winslett, "Towards an
Efficient and Language-Agnostic Compliance Checker for Trust
Negotiation Systems," University of Illinois at Urbana-Champaign
Department of Computer Science Technical Report
No. UIUCDCS-R-2007-2903, October 2007. [PDF] Note: This is an extended version of [C09]. |
[NR02] |
Adam J. Lee and Marianne Winslett, "Virtual Fingerprinting as a
Foundation for Reputation in Open Systems," University of Illinois
at Urbana-Champaign Department of Computer Science Technical
Report No. UIUCDCS-R-2006-2691, February 2006. [PDF] Note: This is an extended version of [C04]. |
[NR01] | William Yurcik, Adam J. Lee, Gregory A. Koenig, Nadir Kiyanclar, Dmitry Mogilevsky, and Michael Treaster, " Cluster Security Research Challenges ," NSF Infrastructure Experience 2005, NSF/CISE/CNS Cluster Computing Infrastructure Experience Workshop, Siebel Center for Computing Science, University of Illinois at Urbana-Champaign, July 27, 2005. [PDF] |