Old Web
English
Sign In
Acemap
>
authorDetail
>
BauerLujo
BauerLujo
Computer science
Security policy
Computer security
Internet privacy
security automata
8
Papers
14
Citations
0.00
KQI
Citation Trend
Filter By
Interval:
1900~2024
1900
2024
Author
Papers (5)
Sort By
Default
Most Recent
Most Early
Most Citation
No data
Journal
Conference
Others
A General Framework for Adversarial Examples with Objectives
2019
SharifMahmood
BhagavatulaSruti
BauerLujo
K ReiterMichael
Show All
Source
Cite
Save
Citations (0)
Designing Password Policies for Strength and Usability
2016
ShayRichard
KomanduriSaranga
L DurityAdam
HuhPhillip (Seyoung)
L MazurekMichelle
M SegretiSean
UrBlase
BauerLujo
ChristinNicolas
CranorLorrie Faith
Show All
Source
Cite
Save
Citations (0)
Composing expressive runtime security policies
2009
ACM Transactions on Software Engineering and Methodology
BauerLujo
LigattiJay
WalkerDavid
Show All
Source
Cite
Save
Citations (0)
Run-Time Enforcement of Nonsafety Policies
2009
LigattiJay
BauerLujo
WalkerDavid
Show All
Source
Cite
Save
Citations (0)
Mechanisms for secure modular programming in Java
2003
BauerLujo
W AppelAndrew
W FeltenEdward
Show All
Source
Cite
Save
Citations (0)
1