Michael Reiter

Results: 71



#Item
51Mathematical logic / Expert systems / Logic in computer science / Reasoning / Logic programming / Mathematical proof / NP / Credential / Backward chaining / Logic / Mathematics / Knowledge

Efficient Proving for Practical Distributed Access-Control Systems∗ Lujo Bauer† , Scott Garriss† , and Michael K. Reiter‡ Abstract. We present a new technique for generating a formal proof that an access request

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2012-06-20 08:58:10
52Deduction / Logical consequence / Propositional calculus / Geometric group theory / Entailment / Monotonicity of entailment / Amenable group / Sequent calculus / Linear logic / Logic / Mathematical logic / Proof theory

A Linear Logic of Authorization and Knowledge⋆ Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning and Michael K. Reiter Carnegie Mellon University Abstract. We propose a logic for specifying security policies at

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2012-06-20 08:58:08
53Technology / Information appliances / Mobile computers / Smartphones / Bluetooth / Credential / Authentication / Security / Identity management / Access control

Device-Enabled Authorization in the Grey System (Extended Abstract) Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, and Peter Rutenbar Carnegie Mellon University, Pittsburgh, Pennsylvania,

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2012-06-20 08:58:08
54Mathematical logic / Expert systems / Logic in computer science / Reasoning / Identity management / Logic programming / Forward chaining / Credential / Backward chaining / Mathematics / Logic / Knowledge

Efficient Proving for Practical Distributed Access-Control Systems ∗ Lujo Bauer† Scott Garriss† Michael K. Reiter‡

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2012-06-20 08:58:10
55Access control / Computer security / Identity management / File system / Authorization / Tar / Trusted Computing / Internet privacy / Tag / Computing / System software / Information

Toward strong, usable access control for shared distributed data Michelle L. Mazurek, Yuan Liang, William Melicher, Manya Sleeper, Lujo Bauer, Gregory R. Ganger, Nitin Gupta, and Michael K. Reiter* Carnegie Mellon Univer

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2014-01-23 21:09:28
56Social information processing / Web 2.0 / Blog hosting services / Social media / Real-time web / Facebook / Internet privacy / Twitter / Social networking service / World Wide Web / Computing / Software

The Post Anachronism: The Temporal Dimension of Facebook Privacy Lujo Bauer∗ , Lorrie Faith Cranor∗ , Saranga Komanduri∗ , Michelle L. Mazurek∗ , Michael K. Reiter† , Manya Sleeper∗ , Blase Ur∗ ∗

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2013-11-02 19:00:35
57Shin Megami Tensei: Persona / HTTP cookie / P3P / User / Proxy server / Computing / Internet privacy / Internet

Privacy-Preserving Global Customization (Extended Abstract) Robert M. Arlein Ben Jai Markus Jakobsson Fabian Monrose Michael K. Reiter Information Sciences Research Center Bell Labs, Lucent Technologies Murray Hill, NJ,

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:34
58Man-in-the-middle attack / Key / Public-key cryptography / Passphrase / Password strength / OTPW / Cryptography / Key management / Password

Using Voice to Generate Cryptographic Keys Fabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel Bell Labs, Lucent Technologies Murray Hill, NJ, USA Abstract In this position paper, we motivate and summarize our

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:35
59Access control / Password / Keystroke dynamics / Salt / Transaction authentication number / Cryptographic software / Passwd / OTPW / Password strength / Security / Computer security / Cryptography

Password Hardening Based on Keystroke Dynamics Fabian Monrose Michael K. Reiter Susanne Wetzel

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:33
60Computer security / Password strength / Password / Crypt / Security

On User Choice in Graphical Password Schemes Darren Davis Fabian Monrose Michael K. Reiter Johns Hopkins University Carnegie Mellon University {ddavis,fabian}@cs.jhu.edu

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:42
UPDATE