Michael K. Reiter

Personal Homepage
Employer
()
Email

Publication Statistics

Publication period start
1996
Publication period end
2011
Number of co-authors
22

Co-authors
Number of publications with favourite co-authors

Productive Colleagues
Most productive colleagues in number of publications

Publications

Reeder, Robert W., Bauer, Lujo, Cranor, Lorrie F., Reiter, Michael K., Vaniea, Kami (2011): More than skin deep: measuring effects of the underlying model on access-control system us. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2065-2074. http://dx.doi.org/10.1145/1978942.1979243

Mazurek, Michelle L., Arsenault, J. P., Bresee, Joanna, Gupta, Nitin, Ion, Iulia, Johns, Christina, Lee, Daniel, Liang, Yuan, Olsen, Jenny, Salmon, Brandon, Shay, Richard, Vaniea, Kami, Bauer, Lujo, Cranor, Lorrie Faith, Ganger, Gregory R., Reiter, Michael K. (2010): Access control for home data sharing: evaluating social acceptability. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 645-654. http://doi.acm.org/10.1145/1753326.1753421

Bauer, Lujo, Cranor, Lorrie Faith, Reeder, Robert W., Reiter, Michael K., Vaniea, Kami (2009): Real life challenges in access-control management. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 899-908. http://doi.acm.org/10.1145/1518701.1518838

Bauer, Lujo, Cranor, Lorrie Faith, Reeder, Robert W., Reiter, Michael K., Vaniea, Kami (2008): A user study of policy creation in a flexible access-control system. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 543-552. http://doi.acm.org/10.1145/1357054.1357143

Reeder, Robert W., Bauer, Lujo, Cranor, Lorrie Faith, Reiter, Michael K., Bacon, Kelli, How, Keisha, Strong, Heather (2008): Expandable grids for visualizing and authoring computer security policies. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 1473-1482. http://doi.acm.org/10.1145/1357054.1357285

Bauer, Lujo, Cranor, Lorrie Faith, Reiter, Michael K., Vaniea, Kami (2007): Lessons learned from the deployment of a smartphone-based access-control system. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 64-75. http://cups.cs.cmu.edu/soups/2007/proceedings/p64_bauer.pdf

Reiter, Michael K., Rohatgi, Pankaj (2004): Homeland Security. In IEEE Internet Computing, 8 (6) pp. 16-17. http://doi.ieeecomputersociety.org/10.1109/MIC.2004.62

Reiter, Michael K. (1999): High-Confidence Distributed Systems - Guest Editor\'s Introduction. In IEEE Internet Computing, 3 (6) pp. 52-54.

Reiter, Michael K., Rubin, Aviel D. (1999): Anonymous Web Transactions with Crowds. In Communications of the ACM, 42 (2) pp. 32-38. http://doi.acm.org/10.1145/293411.293778

Reiter, Michael K. (1996): Distributed Trust with the Rampart Toolkit. In Communications of the ACM, 39 (4) pp. 71-74.