Adam J. Lee
Orcid: 0000-0002-2596-7256
According to our database1,
Adam J. Lee
authored at least 107 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Getting it Just Right: Towards Balanced Utility, Privacy, and Equity in Shared Space Sensing.
ACM Trans. Internet Things, May, 2024
Understanding Perceived Utility and Comfort of In-Home General-Purpose Sensing through Progressive Exposure.
Proc. ACM Hum. Comput. Interact., 2024
"I know what you did last semester": Understanding Privacy Expectations and Preferences in the Smart Campus.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Co-Designing with Users the Explanations for a Proactive Auto-Response Messaging Agent.
Proc. ACM Hum. Comput. Interact., 2023
2022
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud.
ACM Trans. Priv. Secur., 2022
Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and 'Trusted' Platforms.
Proc. ACM Hum. Comput. Interact., 2022
Tangible Privacy for Smart Voice Assistants: Bystanders' Perceptions of Physical Device Controls.
Proc. ACM Hum. Comput. Interact., 2022
Laila is in a Meeting: Design and Evaluation of a Contextual Auto-Response Messaging Agent.
Proceedings of the DIS '22: Designing Interactive Systems Conference, Virtual Event, Australia, June 13, 2022
2021
Comput. Support. Cooperative Work., 2021
Improving Medication Adherence Behaviors Through Personalized, Technology-Powered Interventions.
Proceedings of the Joint Proceedings of the ACM IUI 2021 Workshops co-located with 26th ACM Conference on Intelligent User Interfaces (ACM IUI 2021), 2021
2020
Anchor of trust: towards collusion-resistant trusted indoor location for enterprise and industrial use.
Pers. Ubiquitous Comput., 2020
Proc. ACM Hum. Comput. Interact., 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Proceedings of the 27th ACM Conference on User Modeling, Adaptation and Personalization, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Shoal: Query Optimization and Operator Placement for Access Controlled Stream Processing Systems.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
Sensing or Watching?: Balancing Utility and Privacy in Sensing Systems via Collection and Enforcement Mechanisms.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Ephemeral Communication and Communication Places - What Influences College-Aged Negotiation of Instant Messaging Usage Within App Ecosystems?
Proceedings of the Transforming Digital Worlds - 13th International Conference, 2018
2017
Viewing the Viewers: Publishers' Desires and Viewers' Privacy Concerns in Social Networks.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Dynamic and Private Cryptographic Access Control for Untrusted Clouds: Costs and Constructions (Extended Version).
CoRR, 2016
On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
PolyStream: Cryptographically Enforced Access Controls for Outsourced Data Stream Processing.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
2015
Decomposing, Comparing, and Synthesizing Access Control Expressiveness Simulations (Extended Version).
CoRR, 2015
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015
Proceedings of the 16th IEEE International Conference on Mobile Data Management, 2015
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015
You're where? prove it!: towards trusted indoor location estimation of mobile devices.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Automated operator placement in distributed Data Stream Management Systems subject to user constraints.
Proceedings of the Workshops Proceedings of the 30th International Conference on Data Engineering Workshops, 2014
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014
On the suitability of dissemination-centric access control systems for group-centric sharing.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
2013
When privacy and utility are in harmony: towards better design of presence technologies.
Pers. Ubiquitous Comput., 2013
The Design and Demonstration of an Actor-Based, Application-Aware Access Control Evaluation Framework
CoRR, 2013
Bounding Trust under Uncertain Topology Information in Reputation-Based Trust Systems.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
2012
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice.
Proceedings of the Symposium On Usable Privacy and Security, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the New Security Paradigms Workshop, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules.
Proceedings of the Financial Cryptography and Data Security, 2012
Confidentiality-preserving and fault-tolerant in-network aggregation for Collaborative WSNs.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Eyeing your exposure: quantifying and controlling information sharing for improved privacy.
Proceedings of the Symposium On Usable Privacy and Security, 2011
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011
Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing.
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the 2011 International Conference on Collaboration Technologies and Systems, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Receipt-mode trust negotiation: efficient authorization through outsourced interactions.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
ACM Trans. Inf. Syst. Secur., 2010
Secured histories: computing group statistics on encrypted data while preserving individual privacy
CoRR, 2010
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
PhD thesis, 2008
ACM Trans. Inf. Syst. Secur., 2008
SIGMOD Rec., 2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the Trust Management II, 2008
Towards an efficient and language-agnostic compliance checker for trust negotiation systems.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
2006
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Proceedings of the Trust Management, 4th International Conference, 2006
Proceedings of the Trust Management, 4th International Conference, 2006
Proceedings of the 7th IEEE/ACM International Conference on Grid Computing (GRID 2006), 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, 2006
2005
CoRR, 2005
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005
Searching for open windows and unlocked doors: port scanning in large-scale commodity clusters.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005
Cluster security with NVisionCC: process monitoring by leveraging emergent properties.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005
2004
NVisionIP: netflow visualizations of system state for security situational awareness.
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004
Proceedings of the IEEE International Conference on Systems, 2004