
- Tim Baarslag, Alper T. Alan, Richard Gomer, Muddasser Alam, Charith Perera, Enrico H. Gerding, and M. C. schraefel. 2017. An automated negotiation agent for permission management. In Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems (AAMAS’17). 380--390. Google Scholar
Digital Library
- Adam Barth, Anupam Datta, John C. Mitchell, and Helen Nissenbaum. 2006. Privacy and contextual integrity: Framework and applications. In Proceedings of the IEEE Symposium on Security and Privacy (SP’06). IEEE Computer Society, 184--198. Google Scholar
Digital Library
- Amit K. Chopra, Fabiano Dalpiaz, F. Başak Aydemir, Paolo Giorgini, John Mylopoulos, and Munindar P. Singh. 2014. Protos: Foundations for engineering innovative sociotechnical systems. In Proceedings of the 18th IEEE International Requirements Engineering Conference (RE’14). IEEE Computer Society, 53--62.Google Scholar
- Natalia Criado and Jose M. Such. 2015. Implicit contextual integrity in online social networks. Information Sciences 325 (2015), 48--69. Google Scholar
Digital Library
- Natalia Criado and Jose M. Such. 2016. Selective norm monitoring. In Proceedings of the 25th International Joint Conference on Artificial Intelligence (IJCAI’16). 208--214. Google Scholar
Digital Library
- CyBOK. 2017. The Cyber Security Body of Knowledge. Retrieved November 2017 from https://www.cybok.org/.Google Scholar
- DoD. 2015. The United States Department of Defense Cybersecurity Culture and Compliance Initiative. Retrieved September 2015 from http://www.defense.gov/Portals/1/Documents/pubs/OSD011517-15-RES-Final.pdf.Google Scholar
- Ricard L. Fogues, Pradeep K. Murukannaiah, Jose M. Such, and Munindar P. Singh. 2017. Sharing policies in multiuser privacy scenarios: Incorporating context, preferences, and arguments in decision making. ACM Transactions on Computer-Human Interaction (TOCHI) 24, 1 (2017), 5. Google Scholar
Digital Library
- Yang Gao, Francesca Toni, Hao Wang, and Fanjiang Xu. 2016. Argumentation-based multi-agent decision making with privacy preserved. In Proceedings of the 15th Conference on Autonomous Agents and Multiagent Systems (AAMAS’16). 1153--1161. Google Scholar
Digital Library
- Christopher W. Geib and Robert P. Goldman. 2001. Plan recognition in intrusion detection systems. In Proceedings of the DARPA Information Survivability Conference & Exposition II (DISCEX’01), Vol. 1. IEEE, 46--55.Google Scholar
- Ponemon Institute. 2016. Cost of Data Breach Study: Global Analysis. Retrieved November 2017 from https://securityintelligence.com/cost-of-a-data-breach-2016/.Google Scholar
- Özgür Kafalı, Nirav Ajmeri, and Munindar P. Singh. 2016a. Revani: Revising and verifying normative specifications for privacy. IEEE Intelligent Systems 31, 5 (Sept. 2016), 8--15.Google Scholar
- Özgür Kafalı, Nirav Ajmeri, and Munindar P. Singh. 2017a. Kont: Computing tradeoffs in normative multiagent systems. In Proceedings of the 31st Conference on Artificial Intelligence (AAAI’17). 3006--3012.Google Scholar
- Özgür Kafalı, Jasmine Jones, Megan Petruso, Laurie Williams, and Munindar P. Singh. 2017b. How good is a security policy against real breaches? A HIPAA case study. In Proceedings of the 39th International Conference on Software Engineering (ICSE’17). IEEE Computer Society, 530--540. Google Scholar
Digital Library
- Özgür Kafalı and Munindar P. Singh. 2017. Guest Editors’ Introduction - Improving Cybersecurity: User Accountability and Sociotechnical Systems. (2017). IEEE Computing Now. https://www.computer.org/web/computingnow/archive/improving-cybersecurity-april-2017-introduction.Google Scholar
- Özgür Kafalı, Munindar P. Singh, and Laurie Williams. 2016b. Nane: Identifying misuse cases using temporal norm enactments. In Proceedings of the 24th IEEE International Requirements Engineering Conference (RE’16). IEEE Computer Society, 136--145.Google Scholar
Cross Ref
- Nadin Kökciyan, Nefise Yaglikci, and Pınar Yolum. 2017. An argumentation approach for resolving privacy disputes in online social networks. ACM Transactions on Internet Technology (TOIT) 17, 3 ( June 2017), 27:1--27:22. Google Scholar
Digital Library
- Gaurav Misra and Jose M. Such. 2017. PACMAN: Personal agent for access control in social media. IEEE Internet Computing 21, 6 (2017), 18--26.Google Scholar
Cross Ref
- Sean Murphy. 2015. Is cybersecurity possible in healthcare? National Cybersecurity Institute Journal 1, 3 (March 2015), 49--63.Google Scholar
- Luis G. Nardin, Tina Balke-Visser, Nirav Ajmeri, Anup K. Kalia, Jaime S. Sichman, and Munindar P. Singh. 2016. Classifying sanctions and designing a conceptual sanctioning process model for socio-technical systems. The Knowledge Engineering Review 31, 2 (March 2016), 142--166.Google Scholar
Cross Ref
- Crowd Research Partners. 2016. Insider Threat Spotlight Report. Retrieved November 2017 from http://crowdresearchpartners.com/portfolio/insider-threat-report/.Google Scholar
- Sarah Rajtmajer, Anna Squicciarini, Jose M. Such, Justin Semonsen, and Andrew Belmonte. 2017. An ultimatum game model for the evolution of privacy in jointly managed content. In International Conference on Decision and Game Theory for Security. Springer, 112--130.Google Scholar
Cross Ref
- Fariba Sadri. 2012. Intention recognition in agents for ambient intelligence: Logic-based approaches. In Agents and Ambient Intelligence. Ambient Intelligence and Smart Environments, Vol. 12. IOS Press, 197--236.Google Scholar
- John Sammons. 2015. Digital Forensics: Threatscape and Best Practices. Syngress. Google Scholar
Digital Library
- Munindar P. Singh. 2013. Norms as a basis for governing sociotechnical systems. ACM Transactions on Intelligent Systems and Technology (TIST) 5, 1 (Dec. 2013), 21:1--21:23. Google Scholar
Digital Library
- Jose M. Such. 2017. Privacy and autonomous systems. In Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI’17). 4761--4767. Google Scholar
Digital Library
- Jose M. Such, Joel Porter, Sören Preibusch, and Adam Joinson. 2017. Photo privacy conflicts in social media: A large-scale empirical study. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 3821--3832. Google Scholar
Digital Library
- Jose M. Such and Michael Rovatsos. 2016. Privacy policy negotiation in social media. ACM Transactions on Autonomous and Adaptive Systems (TAAS) 11, 1 (2016), 4. Google Scholar
Digital Library
- Verizon. 2017. Data Breach Digest. Retrieved November 2017 from http://www.verizonenterprise.com/verizon-insights-lab/data-breach-digest/2017/.Google Scholar
Index Terms
(auto-classified)Guest Editors’ Introduction
Recommendations
Guest Editors' Introduction: Resource Virtualization Renaissance
Virtualization technologies encompass a variety of mechanisms and techniques used to address computer system problems such as security, performance, and reliability by decoupling the architecture and user-perceived behavior of hardware and software ...
Guest Editors' Introduction: Virtual Machines
A system virtual machine is a software implementation of a real computer that can execute unmodified applications and an operating system. This issue contains articles and interviews that explore virtual machine use in pervasive computing.
Guest Editors' introduction: Special section on optimizing the cloud
Cloud computing is defined as a pool of virtualized computer resources. Based on this virtualization, the cloud computing paradigm allows workloads to be deployed and scaled-out quickly through the rapid provisioning of virtual machines or physical ...






Comments