Author: Lujo Bauer

Lujo Bauer

Lujo Bauer

Publications

Publication period start: 2007
Publication period end: 2012
Number of co-authors: 29

Co-authors

Number of publications with favourite co-authors
Kami Vaniea
5
Michael K. Reiter
6
Lorrie Faith Cranor
9

Productive Colleagues

Most productive colleagues in number of publications
Serge Egelman
13
Robert W. Reeder
14
Lorrie Faith Cranor
44

Publications

Bauer, Lujo, Cranor, Lorrie Faith, Reeder, Robert W., Reiter, Michael K., Vaniea, Kami (2008): A user study of policy creation in a flexible access-control system. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 543-552. http://doi.acm.org/10.1145/1357054.1357143

Reeder, Robert W., Bauer, Lujo, Cranor, Lorrie Faith, Reiter, Michael K., Bacon, Kelli, How, Keisha, Strong, Heather (2008): Expandable grids for visualizing and authoring computer security policies. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 1473-1482. http://doi.acm.org/10.1145/1357054.1357285

Bauer, Lujo, Cranor, Lorrie Faith, Reiter, Michael K., Vaniea, Kami (2007): Lessons learned from the deployment of a smartphone-based access-control system. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 64-75. http://cups.cs.cmu.edu/soups/2007/proceedings/p64_bauer.pdf

Bauer, Lujo, Cranor, Lorrie Faith, Reeder, Robert W., Reiter, Michael K., Vaniea, Kami (2009): Real life challenges in access-control management. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 899-908. http://doi.acm.org/10.1145/1518701.1518838

Shay, Richard, Komanduri, Saranga, Kelley, Patrick Gage, Leon, Pedro Giovanni, Mazurek, Michelle L., Bauer, Lujo, Christin, Nicolas, Cranor, Lorrie Faith (2010): Encountering stronger password requirements: user attitudes and behaviors. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 2. http://doi.acm.org/10.1145/1837110.1837113

Mazurek, Michelle L., Arsenault, J. P., Bresee, Joanna, Gupta, Nitin, Ion, Iulia, Johns, Christina, Lee, Daniel, Liang, Yuan, Olsen, Jenny, Salmon, Brandon, Shay, Richard, Vaniea, Kami, Bauer, Lujo, Cranor, Lorrie Faith, Ganger, Gregory R., Reiter, Michael K. (2010): Access control for home data sharing: evaluating social acceptability. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 645-654. http://doi.acm.org/10.1145/1753326.1753421

Reeder, Robert W., Bauer, Lujo, Cranor, Lorrie F., Reiter, Michael K., Vaniea, Kami (2011): More than skin deep: measuring effects of the underlying model on access-control system us. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2065-2074. http://dx.doi.org/10.1145/1978942.1979243

Mazurek, Michelle L., Klemperer, Peter F., Shay, Richard, Takabi, Hassan, Bauer, Lujo, Cranor, Lorrie Faith (2011): Exploring reactive access control. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2085-2094. http://dx.doi.org/10.1145/1978942.1979245

Komanduri, Saranga, Shay, Richard, Kelley, Patrick Gage, Mazurek, Michelle L., Bauer, Lujo, Christin, Nicolas, Cranor, Lorrie Faith, Egelman, Serge (2011): Of passwords and people: measuring the effect of password-composition policies. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2595-2604. http://dx.doi.org/10.1145/1978942.1979321

Shay, Richard, Kelley, Patrick Gage, Komanduri, Saranga, Mazurek, Michelle L., Ur, Blase, Vidas, Timothy, Bauer, Lujo, Christin, Nicolas, Cranor, Lorrie Faith (2012): Correct horse battery staple: exploring the usability of system-assigned passphrases. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 7. http://dx.doi.org/10.1145/2335356.2335366