Author: Michael K. Reiter

Publications

Publication period start: 2011
Number of co-authors: 22

Co-authors

Number of publications with favourite co-authors
Lorrie Faith Cranor
5
Kami Vaniea
5
Lujo Bauer
6

Productive Colleagues

Most productive colleagues in number of publications
Aviel D. Rubin
11
Robert W. Reeder
14
Lorrie Faith Cranor
44

Publications

Reiter, Michael K., Rohatgi, Pankaj (2004): Homeland Security. In IEEE Internet Computing, 8 (6) pp. 16-17. https://doi.ieeecomputersociety.org/10.1109/MIC.2004.62

Reiter, Michael K. (1999): High-Confidence Distributed Systems - Guest Editor\'s Introduction. In IEEE Internet Computing, 3 (6) pp. 52-54.

Reiter, Michael K., Rubin, Aviel D. (1999): Anonymous Web Transactions with Crowds. In Communications of the ACM, 42 (2) pp. 32-38. https://dl.acm.org/doi/10.1145/293411.293778

Reiter, Michael K. (1996): Distributed Trust with the Rampart Toolkit. In Communications of the ACM, 39 (4) pp. 71-74.

Bauer, Lujo, Cranor, Lorrie Faith, Reeder, Robert W., Reiter, Michael K., Vaniea, Kami (2008): A user study of policy creation in a flexible access-control system. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 543-552. https://doi.acm.org/10.1145/1357054.1357143

Reeder, Robert W., Bauer, Lujo, Cranor, Lorrie Faith, Reiter, Michael K., Bacon, Kelli, How, Keisha, Strong, Heather (2008): Expandable grids for visualizing and authoring computer security policies. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 1473-1482. https://doi.acm.org/10.1145/1357054.1357285

Bauer, Lujo, Cranor, Lorrie Faith, Reiter, Michael K., Vaniea, Kami (2007): Lessons learned from the deployment of a smartphone-based access-control system. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 64-75. https://cups.cs.cmu.edu/soups/2007/proceedings/p64_bauer.pdf

Bauer, Lujo, Cranor, Lorrie Faith, Reeder, Robert W., Reiter, Michael K., Vaniea, Kami (2009): Real life challenges in access-control management. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 899-908. https://doi.acm.org/10.1145/1518701.1518838

Mazurek, Michelle L., Arsenault, J. P., Bresee, Joanna, Gupta, Nitin, Ion, Iulia, Johns, Christina, Lee, Daniel, Liang, Yuan, Olsen, Jenny, Salmon, Brandon, Shay, Richard, Vaniea, Kami, Bauer, Lujo, Cranor, Lorrie Faith, Ganger, Gregory R., Reiter, Michael K. (2010): Access control for home data sharing: evaluating social acceptability. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 645-654. https://doi.acm.org/10.1145/1753326.1753421

Reeder, Robert W., Bauer, Lujo, Cranor, Lorrie F., Reiter, Michael K., Vaniea, Kami (2011): More than skin deep: measuring effects of the underlying model on access-control system us. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2065-2074. https://dx.doi.org/10.1145/1978942.1979243

New to UX Design? We’re giving you a free ebook!

The Basics of User Experience Design

Download our free ebook The Basics of User Experience Design to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,644 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We’re Giving You a Free ebook!

The Basics of User Experience Design

Download our free ebook The Basics of User Experience Design to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,644 designers enjoy our newsletter—sure you don’t want to receive it?