Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch.
Loading Scinapse...
Published on Oct 24, 2016 in Computer and Communications Security
Edgar R. Weippl23
Estimated H-index: 23
,
Stefan Katzenbeisser32
Estimated H-index: 32
(Technische Universität Darmstadt)
+ 2 AuthorsShai Halevi60
Estimated H-index: 60
(IBM)
It is our pleasure to present the proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS 2016), held in Vienna, Austria, on October 24-28, 2016. All papers in the proceedings were subject to a rigorous process of peer review. We received 831 fully reviewed submissions, the largest number of submissions received to date by a computer security conference. A Program Committee comprising 141 experts from 20 countries, helped by 360 external re...
8 Citations
Published on Oct 24, 2016 in Computer and Communications Security
It is our pleasure to present the proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS 2016), held in Vienna, Austria, on October 24-28, 2016. All papers in the proceedings were subject to a rigorous process of peer review. We received 831 fully reviewed submissions, the largest number of submissions received to date by a computer security conference. A Program Committee comprising 141 experts from 20 countries, helped by 360 external re...
8 Citations
Published on Apr 1, 1987 in IEEE Symposium on Security and Privacy
David D. Clark46
Estimated H-index: 46
,
David R. Wilson17
Estimated H-index: 17
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to provide control of classified information. However, for that core of data processing concerned with business operation and control of assets, the primary security concern is data integrity. This paper presents a policy for data integrity based on commercial data processing practices, and compares...
962 Citations Source Cite
Published on May 1, 2018 in IEEE Symposium on Security and Privacy
Lucy Simko1
Estimated H-index: 1
(University of Washington),
Ada Lerner (Wellesley College)+ 2 AuthorsTadayoshi Kohno48
Estimated H-index: 48
(University of Washington)
In this work, we consider the computer security and privacy practices and needs of recently resettled refugees in the United States. We ask: How do refugees use and rely on technology as they settle in the US? What computer security and privacy practices do they have, and what barriers do they face that may put them at risk? And how are their computer security mental models and practices shaped by the advice they receive? We study these questions through...
Source Cite
Published on Mar 1, 2011 in IEEE Symposium on Security and Privacy
Cristian Bravo-Lillo6
Estimated H-index: 6
(Carnegie Mellon University),
Lorrie Faith Cranor66
Estimated H-index: 66
(Carnegie Mellon University)
+ 1 AuthorsSaranga Komanduri18
Estimated H-index: 18
(Carnegie Mellon University)
Computer security warnings are intended to protect users and their computers. However, research suggests that these warnings might be largely ineffective because they're frequently ignored. The authors describe a mental model interview study designed to gain insight into how advanced and novice computer users perceive and respond to computer warnings. Developers can leverage the approaches of advanced users to design more effective warnings for novice users.
87 Citations Source Cite
Published on Sep 1, 2014 in IEEE Symposium on Security and Privacy
Tiffani R. Chen3
Estimated H-index: 3
(George Mason University),
Daniel B. Shore2
Estimated H-index: 2
(George Mason University)
+ 3 AuthorsAiva K. Gorab1
Estimated H-index: 1
(George Mason University)
Generally, computer security incident response team (CSIRT) managers and team members focus only on individual-level skills. The field of organizational psychology can contribute to an understanding of the full range of CSIRT job requirements, which include working as a team and within a larger multiteam system.
10 Citations Source Cite
Published on Jan 1, 2003 in IEEE Symposium on Security and Privacy
Matt Bishop32
Estimated H-index: 32
(University of California, Davis)
Computer and network security, or cybersecurity, are critical issues. But merely protecting the systems that hold data about citizens, corporations, and government agencies it is not enough. The infrastructure of networks, routers, domain name servers, and switches that glue these systems together must not fail, or computers will no longer be able to communicate accurately or reliably. Given the magnitude of securing cyberspace, a reflection on what we are trying to do seems...
120 Citations Source Cite
Published on Sep 1, 2014 in IEEE Symposium on Security and Privacy
Robin Ruefle2
Estimated H-index: 2
(Carnegie Mellon University),
Audrey J. Dorofee11
Estimated H-index: 11
(Carnegie Mellon University)
+ 3 AuthorsSamuel J. Perl3
Estimated H-index: 3
(Carnegie Mellon University)
When computer security incidents occur, it's critical that organizations be able to handle them in a timely manner. The speed with which an organization can recognize, analyze, and respond to an incident will affect the damage and lower recovery costs. Organized incident management requires defined, repeatable processes and the ability to learn from incidents that threaten the confidentiality, availability, and integrity of critical systems and data. Some organizations assign respo...
16 Citations Source Cite
Published on May 1, 2017 in IEEE Symposium on Security and Privacy
Cormac Herley40
Estimated H-index: 40
(Microsoft),
P.C. van Oorschot33
Estimated H-index: 33
(Carleton University)
The past ten years has seen increasing calls to makesecurity research more "scientific".On the surface, most agree that this is desirable, given universal recognition of "science" as a positive force. However, we find that there is little clarity on what "scientific" means inthe context of computer security research, or consensus onwhat a "Science of Security" should look like. We selectively review work in the history and philosophy of scienceand more recent work under the ...
9 Citations Source Cite
Published on May 1, 2012 in IEEE Symposium on Security and Privacy
Adele E. Howe28
Estimated H-index: 28
(Colorado State University),
Indrajit Ray25
Estimated H-index: 25
(Colorado State University)
+ 2 AuthorsZinta S. Byrne19
Estimated H-index: 19
(Colorado State University)
The home computer user is often said to be the weakest link in computer security. They do not always follow security advice, and they take actions, as in phishing, that compromise themselves. In general, we do not understand why users do not always behave safely, which would seem to be in their best interest. This paper reviews the literature of surveys and studies of factors that influence security decisions for home computer users. We organize the revi...
45 Citations Source Cite