John Mitchell

Results: 387



#Item
101Computer-mediated communication / Human–computer interaction / Groupware / Multimodal interaction / Virtual reality / Usability / Collaborative software / E-learning / Prototype / Science / Human–computer interaction / Technology

Towards a user-centred method for studying CVLEs Daphne Economou, William L. Mitchell and Tom Boyle* Department of Computing and Mathematics, Manchester Metropolitan University, John Dalton Building, Chester Street, Manc

Add to Reading List

Source URL: ui4all.ics.forth.gr

Language: English - Date: 2007-11-27 14:01:51
102Cross-platform software / JavaScript / Object-capability model / Heap / Constructor / C / Property / Futures and promises / Computing / Software engineering / Computer programming

Object Capabilities and Isolation of Untrusted Web Applications Sergio Maffeis Imperial College London John C. Mitchell Stanford University

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-09 17:40:17
103Computer security / Constraint programming / Datalog / Cryptography / Role-based access control / Credential / Digital credential / Trust negotiation / Constraint logic programming / Security / Identity management / Access control

RT : A Role-based Trust-management Framework∗ Ninghui Li John C. Mitchell Department of Computer Science, Stanford University Gates 4B, Stanford, CA {ninghui.li, mitchell}@cs.stanford.edu

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2003-11-04 15:32:03
104Scripting languages / Type theory / Cross-platform software / JavaScript / ECMAScript / Eval / Closure / Prototype-based programming / Caja project / Software engineering / Computing / Computer programming

Run-Time Enforcement of Secure JavaScript Subsets Sergio Maffeis Imperial College London John C. Mitchell

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2009-06-18 11:30:20
105Datalog / Central Intelligence Agency / ALGOL 68 / Propositional calculus / Mathematical logic / Logic / Programming language theory

Beyond Proof-of-compliance: Security Analysis in Trust Management NINGHUI LI Purdue University JOHN C. MITCHELL Stanford University

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-17 01:15:33
106Computing / Identity management / Social issues / Data privacy / Health Insurance Portability and Accountability Act / Norm / Internet privacy / Enterprise Privacy Authorization Language / Information privacy / Ethics / Privacy / Algebra

Privacy and Contextual Integrity: Framework and Applications Adam Barth Anupam Datta John C. Mitchell Stanford University

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-17 00:58:55
107Endangered species / IUCN Red List / Predation / Economic model / Extinction / Conservation / Environment / Ecology

WMAC-2 report John Mitchell and Christian Jakob WMAC Co-Chairs

Add to Reading List

Source URL: www.wcrp-climate.org

Language: English - Date: 2013-07-04 10:08:22
108Human-based computation / World Wide Web / Alan Turing / Transaction authentication number / Turing test / Optical character recognition / Artificial intelligence / Computing / CAPTCHA

How Good are Humans at Solving CAPTCHAs? A Large Scale Evaluation Elie Bursztein, Steven Bethard, Celine Fabry, John C. Mitchell, Dan Jurafsky , , , mitchell@

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-09 17:30:39
109Computing / Identity management / Social issues / Data privacy / Health Insurance Portability and Accountability Act / Norm / Internet privacy / Enterprise Privacy Authorization Language / Information privacy / Ethics / Privacy / Algebra

Privacy and Contextual Integrity: Framework and Applications Adam Barth Anupam Datta John C. Mitchell Stanford University

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2015-04-16 18:44:09
110Advantage / Cryptographic protocol / Cipher / XTR / Cryptography / Ciphertext indistinguishability / Semantic security

Inductive Trace Properties for Computational Security Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. Protocol authentication properties are generally

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-27 15:51:40
UPDATE