Publication statistics

Pub. period:2002-2011
Pub. count:7
Number of co-authors:13



Co-authors

Number of publications with 3 favourite co-authors:

Jacob P. Baskin:
Andrew Oates:
Morgan McGuire:

 

 

Productive colleagues

Shriram Krishnamurthi's 3 most productive colleagues in number of publications:

Hanspeter Pfister:29
Serge Egelman:13
Morgan McGuire:6
 
 
 

Upcoming Courses

go to course
User-Centred Design - Module 2
Starts TODAY LAST CALL!
go to course
User Experience: The Beginner's Guide
Starts TODAY LAST CALL!
 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

 
 
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
 
 
 
 
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading
 
 

Shriram Krishnamurthi

 

Publications by Shriram Krishnamurthi (bibliography)

 what's this?
2011
 
Edit | Del

Egelman, Serge, Oates, Andrew and Krishnamurthi, Shriram (2011): Oops, I did it again: mitigating repeated access control errors on Facebook. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems 2011. pp. 2295-2304. Available online

We performed a study of Facebook users to examine how they coped with limitations of the Facebook privacy settings interface. Students graduating and joining the workforce create significant problems for all but the most basic privacy settings on social networking websites. We therefore created realistic scenarios exploiting work/play boundaries that required users to specify access control policies that were impossible due to various limitations. We examined whether users were aware of these problems without being prompted, and once given feedback, what their coping strategies were. Overall, we found that simply alerting participants to potential errors was ineffective, but when choices were also presented, participants introduced significantly fewer errors. Based on our findings, we designed a privacy settings interface based on Venn diagrams, which we validated with a usability study. We conclude that this interface may be more effective than the current privacy settings interface.

© All rights reserved Egelman et al. and/or their publisher

2009
 
Edit | Del

Guha, Arjun, Krishnamurthi, Shriram and Jim, Trevor (2009): Using static analysis for Ajax intrusion detection. In: Proceedings of the 2009 International Conference on the World Wide Web 2009. pp. 561-570. Available online

We present a static control-flow analysis for JavaScript programs running in a web browser. Our analysis tackles numerous challenges posed by modern web applications including asynchronous communication, frameworks, and dynamic code generation. We use our analysis to extract a model of expected client behavior as seen from the server, and build an intrusion-prevention proxy for the server: the proxy intercepts client requests and disables those that do not meet the expected behavior. We insert random asynchronous requests to foil mimicry attacks. Finally, we evaluate our technique against several real applications and show that it protects against an attack in a widely-used web application.

© All rights reserved Guha et al. and/or ACM Press

 
Edit | Del

Fisler, Kathi and Krishnamurthi, Shriram (2009): Escape from the matrix: lessons from a case-study in access-control requirements. In: Proceedings of the 2009 Symposium on Usable Privacy and Security 2009. p. 28. Available online

 
Edit | Del

Baskin, Jacob P. and Krishnamurthi, Shriram (2009): Preference aggregation in group recommender systems for committee decision-making. In: Proceedings of the 2009 ACM Conference on Recommender Systems 2009. pp. 337-340. Available online

We present a preference aggregation algorithm designed for situations in which a limited number of users each review a small subset of a large (but finite) set of candidates. This algorithm aggregates scores by using users' relative preferences to search for a Kemeny-optimal ordering of items, and then uses this ordering to identify good and bad items, as well as those that are the subject of reviewer conflict. The algorithm uses variable-neighborhood local search, allowing the efficient discovery of high-quality consensus orderings while remaining computationally feasible. It provides a significant increase in solution quality over existing systems. We discuss potential applications of this algorithm in group recommender systems for a variety of scenarios, including program committees and faculty searches.

© All rights reserved Baskin and Krishnamurthi and/or ACM Press

2007
 
Edit | Del

McCarthy, Jay A., Krishnamurthi, Shriram, Guttman, Joshua D. and Ramsdell, John D. (2007): Compiling cryptographic protocols for deployment on the web. In: Proceedings of the 2007 International Conference on the World Wide Web 2007. pp. 687-696. Available online

Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management annotations are attached to protocol actions, and are used to constrain the behavior of a protocol participant to be compatible with its own trust policy. The first implementation of CPPL generated stand-alone, single-session servers, making it unsuitable for deploying protocols on the Web. We describe a new compiler that uses a constraint-based analysis to produce multi-session server programs. The resulting programs run without persistent TCP connections for deployment on traditional Web servers. Most importantly, the compiler preserves existing proofs about the protocols. We present an enhanced version of the CPPL language, discuss the generation and use of constraints, show their use in the compiler, formalize the preservation of properties, present subtleties, and outline implementation details.

© All rights reserved McCarthy et al. and/or International World Wide Web Conference Committee

2006
 
Edit | Del

McGuire, Morgan, Stathis, George, Pfister, Hanspeter and Krishnamurthi, Shriram (2006): Abstract shade trees. In: Olano, Marc and Squin, Carlo H. (eds.) Proceedings of the 2006 Symposium on Interactive 3D Graphics, SI3D 2006, March 14-17, 2006, Redwood City, California, USA 2006. pp. 79-86. Available online

2002
 
Edit | Del

Krishnamurthi, Shriram and Ramakrishnan, C. R. (eds.) Practical Aspects of Declarative Languages, 4th International Symposium - PADL 2002 January 19-20, 2002, Portland, OR, USA.

 
Add publication
Show list on your website
 
 

Join our community and advance:

Your
Skills

Your
Network

Your
Career

 
Join our community!
 
 
 

Page Information

Page maintainer: The Editorial Team
URL: http://www.interaction-design.org/references/authors/shriram_krishnamurthi.html