Author image not provided
 Scott Garriss

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article20.78
Citation Count187
Publication count9
Publication years2005-2011
Available for download3
Average downloads per article688.00
Downloads (cumulative)2,064
Downloads (12 Months)51
Downloads (6 Weeks)9
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


9 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 9 of 9
Sort by:

1 published by ACM
June 2011 ACM Transactions on Information and System Security (TISSEC): Volume 14 Issue 1, May 2011
Publisher: ACM
Bibliometrics:
Citation Count: 13
Downloads (6 Weeks): 8,   Downloads (12 Months): 38,   Downloads (Overall): 718

Full text available: PDFPDF
Access-control policy misconfigurations that cause requests to be erroneously denied can result in wasted time, user frustration, and, in the context of particular applications (e.g., health care), very severe consequences. In this article we apply association rule mining to the history of accesses to predict changes to access-control policies that ...
Keywords: machine learning, Access control, policy inference

2 published by ACM
June 2008 MobiSys '08: Proceedings of the 6th international conference on Mobile systems, applications, and services
Publisher: ACM
Bibliometrics:
Citation Count: 22
Downloads (6 Weeks): 1,   Downloads (12 Months): 7,   Downloads (Overall): 838

Full text available: PDFPDF
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a public computing device, or kiosk, prior to resuming her environment on the kiosk. We have designed a protocol by which the mobile ...
Keywords: integrity verification, kiosk computing, personalized computing, trusted platform module, mobility, virtualization

3 published by ACM
June 2008 SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies
Publisher: ACM
Bibliometrics:
Citation Count: 17
Downloads (6 Weeks): 0,   Downloads (12 Months): 6,   Downloads (Overall): 508

Full text available: PDFPDF
Access-control policy misconfigurations that cause requests to be erroneously denied can result in wasted time, user frustration and, in the context of particular applications (e.g., health care), very severe consequences. In this paper we apply association rule mining to the history of accesses to predict changes to access-control policies that ...

4
January 2008
Bibliometrics:
Citation Count: 0

Distributed access-control systems implemented using formal logic have several advantages over conventional access-control systems; namely, they allow for decentralized policy administration, can express a wide variety of policies without ambiguity, and provide greater assurance that granted accesses comply with access-control policy. Access is granted only if the system can construct ...

5
September 2007 ESORICS'07: Proceedings of the 12th European conference on Research in Computer Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 10

We present a new technique for generating a formal proof that an access request satisfies access-control policy, for use in logic-based access-control frameworks. Our approach is tailored to settings where credentials needed to complete a proof might need to be obtained from, or reactively created by, distant components in a ...

6
March 2007 HOTMOBILE '07: Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 11

We present a system in which a user leverages a personal mobile device to establish trust on a public computing device, or kiosk, prior to revealing personal information to that kiosk. We have designed and implemented a protocol by which the mobile device determines the identity and integrity of the ...

7
May 2006 NSDI'06: Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
Publisher: USENIX Association
Bibliometrics:
Citation Count: 39

The explosive growth in unwanted email has prompted the development of techniques for the rejection of email, intended to shield recipients from the onerous task of identifying the legitimate email in their inboxes amid a sea of spam. Unfortunately, widely used content-based filtering systems have converted the spam problem into ...

8
September 2005 ISC'05: Proceedings of the 8th international conference on Information Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 33

We describe the design of Grey, a set of software extensions that convert an off-the-shelf smartphone-class device into a tool by which its owner exercises and delegates her authority to both physical and virtual resources. We focus on the software components and user interfaces of Grey, highlighting the features of ...

9
May 2005 SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 42

We present a distributed algorithm for assembling a proof that a request satisfies an access-control policy expressed in a formal logic, in the tradition of Lampson et al. We show analytically that our distributed proof-generation algorithm succeeds in assembling a proof whenever a centralized prover utilizing remote certificate retrieval would ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us