William R. Claycomb

According to our database1, William R. Claycomb authored at least 32 papers between 2006 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Protection from Insider Threats.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

2016
Introduction to the Inside the Insider Threat Minitrack.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Detecting Insider Threats: Who Is Winning the Game?
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

2014
Guest Editorial: Emerging Trends in Research for Insider Threat Detection.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

2013
A Method For Characterizing Sociotechnical Events Related to Insider Threat Sabotage.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Guest editorial: A brief overview of data leakage and insider threats.
Inf. Syst. Frontiers, 2013

2012
Enhancing directory virtualization to detect insider activity.
Secur. Commun. Networks, 2012

Frontiers in Insider Threats and Data Leakage Prevention.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

Chronological Examination of Insider Threat Sabotage: Preliminary Observations.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

A policy-based decentralized authorization management framework for cloud computing.
Proceedings of the ACM Symposium on Applied Computing, 2012

Insider Threats to Cloud Computing: Directions for New Research Challenges.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

2011
A novel node level security policy framework for wireless sensor networks.
J. Netw. Comput. Appl., 2011

Extending Formal Analysis of Mobile Device Authentication.
J. Internet Serv. Inf. Secur., 2011

Toward role-based provisioning and access control for infrastructure as a service (IaaS).
J. Internet Serv. Appl., 2011

Formal analysis of device authentication applications in ubiquitous computing.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

2010
A visual way to talk to strangers: authentication in wireless pervasive computing.
Int. J. Ad Hoc Ubiquitous Comput., 2010

A framework for risk analysis in virtual directory security.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

A group-based security policy for wireless sensor networks.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Towards Secure Virtual Directories: A Risk Analysis Framework.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Detecting insider activity using enhanced directory virtualization.
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010

2009
A User Controlled Approach for Securing Sensitive Information in Directory Services.
J. Univers. Comput. Sci., 2009

An Enhanced Approach to using Virtual Directories for Protecting Sensitive Information.
Proceedings of the Security in Information Systems, 2009

Key Establishment Using Group Information for Wireless Sensor Networks.
Proceedings of the Sensor Systems and Software, 2009

Authenticated Dictionary-Based Attribute Sharing in Federated Identity Management.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

A Framework for Enabling User-Controlled Persona in Online Social Networks.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

An opensocial extension for enabling user-controlled persona in online social networks.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

2008
Protecting Sensitive Information in Directory Services Using Virtual Directories.
Proceedings of the Collaborative Computing: Networking, 2008

2007
Towards secure resource sharing for impromptu collaboration in pervasive computing.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

2006
Enabling mobility in enterprise security management.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

Using A Two Dimensional Colorized Barcode Solution for Authentication in Pervasive Computing.
Proceedings of the ACS/IEEE International Conference on Pervasive Services 2006, 2006

A Visual Framework for Securing Impromptu Collaboration in Pervasive Computing.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

Mobile-driven architecture for managing enterprise security policies.
Proceedings of the 44st Annual Southeast Regional Conference, 2006


  Loading...