Michael S. Kirkpatrick

Orcid: 0000-0002-7200-4102

Affiliations:
  • James Madison University, Department of Computer Science, Harrisonburg, VA, USA
  • Purdue University, West Lafayette, IN, USA (PhD 2011)


According to our database1, Michael S. Kirkpatrick authored at least 34 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Platform or Foundational Concept? Approaches to Teaching Modern Web Development.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

Managing Authority When Teaching Computing Ethics.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

2021
Upholding ACM's principles.
Commun. ACM, 2021

2020
Assignments that Blend Ethics and Technology.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

2019
ACM Code of Ethics: Looking Back and Forging Ahead.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

Automating Systems Course Unit and Integration Testing: Experience Report.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

2018
Active Learning Strategies for Integrating the ACM Code of Ethics into CS Courses: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

OpenCSF: An Online Interactive Textbook for Computer Systems Fundamentals (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

2017
Evaluating an Alternative CS1 for Students with Prior Programming Experience.
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Student Perspectives of Team-Based Learning in a CS Course: Summary of Qualitative Findings.
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

2015
Marlin: Mitigating Code Reuse Attacks Using Code Randomization.
IEEE Trans. Dependable Secur. Comput., 2015

Best Practices for IRB Approval: Four Perspectives.
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Backward Design: An Integrated Approach to a Systems Curriculum.
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Using the Readiness Assurance Process and Metacognition in an Operating Systems Course.
Proceedings of the 2015 ACM Conference on Innovation and Technology in Computer Science Education, 2015

2014
A formal proximity model for RBAC systems.
Comput. Secur., 2014

Integrating active learning techniques into systems courses (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

2013
Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks.
Proceedings of the Network and System Security - 7th International Conference, 2013

A secure architecture design based on application isolation, code minimization and randomization.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Privacy-Preserving Enforcement of Spatially Aware RBAC.
IEEE Trans. Dependable Secur. Comput., 2012

Resilient Authenticated Execution of Critical Applications in Untrusted Environments.
IEEE Trans. Dependable Secur. Comput., 2012

Marlin: making it harder to fish for gadgets.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Trusted enforcement of contextual access control
PhD thesis, 2011

Prox-RBAC: a proximity-based spatially aware RBAC.
Proceedings of the 19th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2011

Location-based access control systems for mobile users: concepts and research directions.
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2011

Enforcing physically restricted access control for remote data.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

PUF ROKs: a hardware approach to read-once keys.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Enforcing spatial constraints for mobile RBAC systems.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

PEAR: a hardware based protocol authentication system.
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2010

PUF ROKs: generating read-once keys from physically unclonable functions.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

A selective encryption approach to fine-grained access control for P2P file sharing.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
Context-Dependent Authentication and Access Control.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

Towards location-based access control in healthcare emergency response.
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, 2009

Physically restricted authentication with trusted hardware.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

Location-Aware Authentication and Access Control.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009


  Loading...