Search Results - "Cranor, L. F."
-
1
Engineering Privacy
Published in IEEE transactions on software engineering (01-01-2009)“…In this paper we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic…”
Get full text
Journal Article -
2
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms
Published in 2012 IEEE Symposium on Security and Privacy (01-05-2012)“…Text-based passwords remain the dominant authentication method in computer systems, despite significant advancement in attackers' capabilities to perform…”
Get full text
Conference Proceeding -
3
An analysis of security vulnerabilities in the movie production and distribution process
Published in Telecommunications policy (01-08-2004)“…Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable…”
Get full text
Journal Article -
4
A selection of papers from the 31st Annual Telecommunications Policy Research Conference
Published in Telecommunications policy (01-08-2004)Get full text
Journal Article -
5
Out of sight, out of mind: Effects of displaying access-control information near the item it controls
Published in 2012 Tenth Annual International Conference on Privacy, Security and Trust (01-07-2012)“…We take a detailed look at how users, while focusing on non-permission tasks, notice and fix access-control permission errors depending on where the…”
Get full text
Conference Proceeding -
6
P3P: making privacy policies more useful
Published in IEEE security & privacy (01-11-2003)“…The World Wide Web Consortium's Platform for Privacy Preferences (P3P) lets Web sites convey their privacy policies in a computer-readable format. Although not…”
Get full text
Magazine Article -
7
Scrubbing Stubborn Data: An Evaluation of Counter-Forensic Privacy Tools
Published in IEEE security & privacy (01-09-2006)“…An evaluation of six privacy tools highlights significant shortfalls in their methods and implementations. It also raises a question: how much privacy…”
Get full text
Magazine Article -
8
Giving notice: why privacy policies and security breach notifications aren't enough
Published in IEEE communications magazine (01-08-2005)“…Anecdotal evidence suggests that although consumers say they want companies to post privacy policies and make security breach disclosures, these notices are…”
Get full text
Magazine Article